Dec 3 01:41:01 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Dec 3 01:41:01 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Dec 3 01:41:01 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Dec 3 01:41:01 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 3 01:41:01 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 3 01:41:01 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 3 01:41:01 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 3 01:41:01 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 3 01:41:01 localhost kernel: signal: max sigframe size: 1776 Dec 3 01:41:01 localhost kernel: BIOS-provided physical RAM map: Dec 3 01:41:01 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 3 01:41:01 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 3 01:41:01 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 3 01:41:01 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Dec 3 01:41:01 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Dec 3 01:41:01 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 3 01:41:01 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 3 01:41:01 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Dec 3 01:41:01 localhost kernel: NX (Execute Disable) protection: active Dec 3 01:41:01 localhost kernel: SMBIOS 2.8 present. Dec 3 01:41:01 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 3 01:41:01 localhost kernel: Hypervisor detected: KVM Dec 3 01:41:01 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 3 01:41:01 localhost kernel: kvm-clock: using sched offset of 1873361457 cycles Dec 3 01:41:01 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 3 01:41:01 localhost kernel: tsc: Detected 2799.998 MHz processor Dec 3 01:41:01 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Dec 3 01:41:01 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 3 01:41:01 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Dec 3 01:41:01 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Dec 3 01:41:01 localhost kernel: Using GB pages for direct mapping Dec 3 01:41:01 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Dec 3 01:41:01 localhost kernel: ACPI: Early table checksum verification disabled Dec 3 01:41:01 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 3 01:41:01 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:01 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:01 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:01 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Dec 3 01:41:01 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:01 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:01 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Dec 3 01:41:01 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Dec 3 01:41:01 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Dec 3 01:41:01 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Dec 3 01:41:01 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Dec 3 01:41:01 localhost kernel: No NUMA configuration found Dec 3 01:41:01 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Dec 3 01:41:01 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd5000-0x43fffffff] Dec 3 01:41:01 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Dec 3 01:41:01 localhost kernel: Zone ranges: Dec 3 01:41:01 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 3 01:41:01 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 3 01:41:01 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Dec 3 01:41:01 localhost kernel: Device empty Dec 3 01:41:01 localhost kernel: Movable zone start for each node Dec 3 01:41:01 localhost kernel: Early memory node ranges Dec 3 01:41:01 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 3 01:41:01 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Dec 3 01:41:01 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Dec 3 01:41:01 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Dec 3 01:41:01 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 3 01:41:01 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 3 01:41:01 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Dec 3 01:41:01 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Dec 3 01:41:01 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 3 01:41:01 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 3 01:41:01 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 3 01:41:01 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 3 01:41:01 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 3 01:41:01 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 3 01:41:01 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 3 01:41:01 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 3 01:41:01 localhost kernel: TSC deadline timer available Dec 3 01:41:01 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Dec 3 01:41:01 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Dec 3 01:41:01 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Dec 3 01:41:01 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Dec 3 01:41:01 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Dec 3 01:41:01 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Dec 3 01:41:01 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Dec 3 01:41:01 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Dec 3 01:41:01 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Dec 3 01:41:01 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Dec 3 01:41:01 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Dec 3 01:41:01 localhost kernel: Booting paravirtualized kernel on KVM Dec 3 01:41:01 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 3 01:41:01 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Dec 3 01:41:01 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Dec 3 01:41:01 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Dec 3 01:41:01 localhost kernel: Fallback order for Node 0: 0 Dec 3 01:41:01 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Dec 3 01:41:01 localhost kernel: Policy zone: Normal Dec 3 01:41:01 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Dec 3 01:41:01 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Dec 3 01:41:01 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 3 01:41:01 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 3 01:41:01 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 3 01:41:01 localhost kernel: software IO TLB: area num 8. Dec 3 01:41:01 localhost kernel: Memory: 2873456K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741260K reserved, 0K cma-reserved) Dec 3 01:41:01 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Dec 3 01:41:01 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Dec 3 01:41:01 localhost kernel: ftrace: allocating 44803 entries in 176 pages Dec 3 01:41:01 localhost kernel: ftrace: allocated 176 pages with 3 groups Dec 3 01:41:01 localhost kernel: Dynamic Preempt: voluntary Dec 3 01:41:01 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Dec 3 01:41:01 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Dec 3 01:41:01 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Dec 3 01:41:01 localhost kernel: #011Rude variant of Tasks RCU enabled. Dec 3 01:41:01 localhost kernel: #011Tracing variant of Tasks RCU enabled. Dec 3 01:41:01 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 3 01:41:01 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Dec 3 01:41:01 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Dec 3 01:41:01 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Dec 3 01:41:01 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Dec 3 01:41:01 localhost kernel: random: crng init done (trusting CPU's manufacturer) Dec 3 01:41:01 localhost kernel: Console: colour VGA+ 80x25 Dec 3 01:41:01 localhost kernel: printk: console [tty0] enabled Dec 3 01:41:01 localhost kernel: printk: console [ttyS0] enabled Dec 3 01:41:01 localhost kernel: ACPI: Core revision 20211217 Dec 3 01:41:01 localhost kernel: APIC: Switch to symmetric I/O mode setup Dec 3 01:41:01 localhost kernel: x2apic enabled Dec 3 01:41:01 localhost kernel: Switched APIC routing to physical x2apic. Dec 3 01:41:01 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 3 01:41:01 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Dec 3 01:41:01 localhost kernel: pid_max: default: 32768 minimum: 301 Dec 3 01:41:01 localhost kernel: LSM: Security Framework initializing Dec 3 01:41:01 localhost kernel: Yama: becoming mindful. Dec 3 01:41:01 localhost kernel: SELinux: Initializing. Dec 3 01:41:01 localhost kernel: LSM support for eBPF active Dec 3 01:41:01 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 3 01:41:01 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 3 01:41:01 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 3 01:41:01 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 3 01:41:01 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 3 01:41:01 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 3 01:41:01 localhost kernel: Spectre V2 : Mitigation: Retpolines Dec 3 01:41:01 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 3 01:41:01 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 3 01:41:01 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 3 01:41:01 localhost kernel: RETBleed: Mitigation: untrained return thunk Dec 3 01:41:01 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 3 01:41:01 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Dec 3 01:41:01 localhost kernel: Freeing SMP alternatives memory: 36K Dec 3 01:41:01 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 3 01:41:01 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Dec 3 01:41:01 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Dec 3 01:41:01 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Dec 3 01:41:01 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Dec 3 01:41:01 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 3 01:41:01 localhost kernel: ... version: 0 Dec 3 01:41:01 localhost kernel: ... bit width: 48 Dec 3 01:41:01 localhost kernel: ... generic registers: 6 Dec 3 01:41:01 localhost kernel: ... value mask: 0000ffffffffffff Dec 3 01:41:01 localhost kernel: ... max period: 00007fffffffffff Dec 3 01:41:01 localhost kernel: ... fixed-purpose events: 0 Dec 3 01:41:01 localhost kernel: ... event mask: 000000000000003f Dec 3 01:41:01 localhost kernel: rcu: Hierarchical SRCU implementation. Dec 3 01:41:01 localhost kernel: rcu: #011Max phase no-delay instances is 400. Dec 3 01:41:01 localhost kernel: smp: Bringing up secondary CPUs ... Dec 3 01:41:01 localhost kernel: x86: Booting SMP configuration: Dec 3 01:41:01 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Dec 3 01:41:01 localhost kernel: smp: Brought up 1 node, 8 CPUs Dec 3 01:41:01 localhost kernel: smpboot: Max logical packages: 8 Dec 3 01:41:01 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Dec 3 01:41:01 localhost kernel: node 0 deferred pages initialised in 25ms Dec 3 01:41:01 localhost kernel: devtmpfs: initialized Dec 3 01:41:01 localhost kernel: x86/mm: Memory block size: 128MB Dec 3 01:41:01 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 3 01:41:01 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Dec 3 01:41:01 localhost kernel: pinctrl core: initialized pinctrl subsystem Dec 3 01:41:01 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 3 01:41:01 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Dec 3 01:41:01 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 3 01:41:01 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 3 01:41:01 localhost kernel: audit: initializing netlink subsys (disabled) Dec 3 01:41:01 localhost kernel: audit: type=2000 audit(1764744059.753:1): state=initialized audit_enabled=0 res=1 Dec 3 01:41:01 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Dec 3 01:41:01 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 3 01:41:01 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Dec 3 01:41:01 localhost kernel: cpuidle: using governor menu Dec 3 01:41:01 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Dec 3 01:41:01 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 3 01:41:01 localhost kernel: PCI: Using configuration type 1 for base access Dec 3 01:41:01 localhost kernel: PCI: Using configuration type 1 for extended access Dec 3 01:41:01 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 3 01:41:01 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Dec 3 01:41:01 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 3 01:41:01 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 3 01:41:01 localhost kernel: cryptd: max_cpu_qlen set to 1000 Dec 3 01:41:01 localhost kernel: ACPI: Added _OSI(Module Device) Dec 3 01:41:01 localhost kernel: ACPI: Added _OSI(Processor Device) Dec 3 01:41:01 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 3 01:41:01 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 3 01:41:01 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 3 01:41:01 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 3 01:41:01 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 3 01:41:01 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 3 01:41:01 localhost kernel: ACPI: Interpreter enabled Dec 3 01:41:01 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Dec 3 01:41:01 localhost kernel: ACPI: Using IOAPIC for interrupt routing Dec 3 01:41:01 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 3 01:41:01 localhost kernel: PCI: Using E820 reservations for host bridge windows Dec 3 01:41:01 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 3 01:41:01 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 3 01:41:01 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Dec 3 01:41:01 localhost kernel: acpiphp: Slot [3] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [4] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [5] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [6] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [7] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [8] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [9] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [10] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [11] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [12] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [13] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [14] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [15] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [16] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [17] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [18] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [19] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [20] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [21] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [22] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [23] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [24] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [25] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [26] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [27] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [28] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [29] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [30] registered Dec 3 01:41:01 localhost kernel: acpiphp: Slot [31] registered Dec 3 01:41:01 localhost kernel: PCI host bridge to bus 0000:00 Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 3 01:41:01 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 3 01:41:01 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 3 01:41:01 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 3 01:41:01 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Dec 3 01:41:01 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 3 01:41:01 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 3 01:41:01 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 3 01:41:01 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 3 01:41:01 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Dec 3 01:41:01 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Dec 3 01:41:01 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 3 01:41:01 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 3 01:41:01 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 3 01:41:01 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 3 01:41:01 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 3 01:41:01 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 3 01:41:01 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 3 01:41:01 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 3 01:41:01 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 3 01:41:01 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 3 01:41:01 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 3 01:41:01 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 3 01:41:01 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 3 01:41:01 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 3 01:41:01 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 3 01:41:01 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 3 01:41:01 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 3 01:41:01 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 3 01:41:01 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 3 01:41:01 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 3 01:41:01 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 3 01:41:01 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 3 01:41:01 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Dec 3 01:41:01 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 3 01:41:01 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 3 01:41:01 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 3 01:41:01 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 3 01:41:01 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 3 01:41:01 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 3 01:41:01 localhost kernel: iommu: Default domain type: Translated Dec 3 01:41:01 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 3 01:41:01 localhost kernel: SCSI subsystem initialized Dec 3 01:41:01 localhost kernel: ACPI: bus type USB registered Dec 3 01:41:01 localhost kernel: usbcore: registered new interface driver usbfs Dec 3 01:41:01 localhost kernel: usbcore: registered new interface driver hub Dec 3 01:41:01 localhost kernel: usbcore: registered new device driver usb Dec 3 01:41:01 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Dec 3 01:41:01 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 3 01:41:01 localhost kernel: PTP clock support registered Dec 3 01:41:01 localhost kernel: EDAC MC: Ver: 3.0.0 Dec 3 01:41:01 localhost kernel: NetLabel: Initializing Dec 3 01:41:01 localhost kernel: NetLabel: domain hash size = 128 Dec 3 01:41:01 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Dec 3 01:41:01 localhost kernel: NetLabel: unlabeled traffic allowed by default Dec 3 01:41:01 localhost kernel: PCI: Using ACPI for IRQ routing Dec 3 01:41:01 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 3 01:41:01 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 3 01:41:01 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 3 01:41:01 localhost kernel: vgaarb: loaded Dec 3 01:41:01 localhost kernel: clocksource: Switched to clocksource kvm-clock Dec 3 01:41:01 localhost kernel: VFS: Disk quotas dquot_6.6.0 Dec 3 01:41:01 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 3 01:41:01 localhost kernel: pnp: PnP ACPI init Dec 3 01:41:01 localhost kernel: pnp: PnP ACPI: found 5 devices Dec 3 01:41:01 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 3 01:41:01 localhost kernel: NET: Registered PF_INET protocol family Dec 3 01:41:01 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 3 01:41:01 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Dec 3 01:41:01 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 3 01:41:01 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 3 01:41:01 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 3 01:41:01 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Dec 3 01:41:01 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Dec 3 01:41:01 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Dec 3 01:41:01 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Dec 3 01:41:01 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 3 01:41:01 localhost kernel: NET: Registered PF_XDP protocol family Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Dec 3 01:41:01 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Dec 3 01:41:01 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 3 01:41:01 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 3 01:41:01 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 3 01:41:01 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 28057 usecs Dec 3 01:41:01 localhost kernel: PCI: CLS 0 bytes, default 64 Dec 3 01:41:01 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 3 01:41:01 localhost kernel: Trying to unpack rootfs image as initramfs... Dec 3 01:41:01 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Dec 3 01:41:01 localhost kernel: ACPI: bus type thunderbolt registered Dec 3 01:41:01 localhost kernel: Initialise system trusted keyrings Dec 3 01:41:01 localhost kernel: Key type blacklist registered Dec 3 01:41:01 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Dec 3 01:41:01 localhost kernel: zbud: loaded Dec 3 01:41:01 localhost kernel: integrity: Platform Keyring initialized Dec 3 01:41:01 localhost kernel: NET: Registered PF_ALG protocol family Dec 3 01:41:01 localhost kernel: xor: automatically using best checksumming function avx Dec 3 01:41:01 localhost kernel: Key type asymmetric registered Dec 3 01:41:01 localhost kernel: Asymmetric key parser 'x509' registered Dec 3 01:41:01 localhost kernel: Running certificate verification selftests Dec 3 01:41:01 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Dec 3 01:41:01 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Dec 3 01:41:01 localhost kernel: io scheduler mq-deadline registered Dec 3 01:41:01 localhost kernel: io scheduler kyber registered Dec 3 01:41:01 localhost kernel: io scheduler bfq registered Dec 3 01:41:01 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Dec 3 01:41:01 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Dec 3 01:41:01 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Dec 3 01:41:01 localhost kernel: ACPI: button: Power Button [PWRF] Dec 3 01:41:01 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 3 01:41:01 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 3 01:41:01 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 3 01:41:01 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 3 01:41:01 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 3 01:41:01 localhost kernel: Non-volatile memory driver v1.3 Dec 3 01:41:01 localhost kernel: rdac: device handler registered Dec 3 01:41:01 localhost kernel: hp_sw: device handler registered Dec 3 01:41:01 localhost kernel: emc: device handler registered Dec 3 01:41:01 localhost kernel: alua: device handler registered Dec 3 01:41:01 localhost kernel: libphy: Fixed MDIO Bus: probed Dec 3 01:41:01 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Dec 3 01:41:01 localhost kernel: ehci-pci: EHCI PCI platform driver Dec 3 01:41:01 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Dec 3 01:41:01 localhost kernel: ohci-pci: OHCI PCI platform driver Dec 3 01:41:01 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Dec 3 01:41:01 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Dec 3 01:41:01 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Dec 3 01:41:01 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Dec 3 01:41:01 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Dec 3 01:41:01 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Dec 3 01:41:01 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Dec 3 01:41:01 localhost kernel: usb usb1: Product: UHCI Host Controller Dec 3 01:41:01 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Dec 3 01:41:01 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Dec 3 01:41:01 localhost kernel: hub 1-0:1.0: USB hub found Dec 3 01:41:01 localhost kernel: hub 1-0:1.0: 2 ports detected Dec 3 01:41:01 localhost kernel: usbcore: registered new interface driver usbserial_generic Dec 3 01:41:01 localhost kernel: usbserial: USB Serial support registered for generic Dec 3 01:41:01 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 3 01:41:01 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 3 01:41:01 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 3 01:41:01 localhost kernel: mousedev: PS/2 mouse device common for all mice Dec 3 01:41:01 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 3 01:41:01 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Dec 3 01:41:01 localhost kernel: rtc_cmos 00:04: registered as rtc0 Dec 3 01:41:01 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-12-03T06:41:00 UTC (1764744060) Dec 3 01:41:01 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 3 01:41:01 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Dec 3 01:41:01 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Dec 3 01:41:01 localhost kernel: usbcore: registered new interface driver usbhid Dec 3 01:41:01 localhost kernel: usbhid: USB HID core driver Dec 3 01:41:01 localhost kernel: drop_monitor: Initializing network drop monitor service Dec 3 01:41:01 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Dec 3 01:41:01 localhost kernel: Initializing XFRM netlink socket Dec 3 01:41:01 localhost kernel: NET: Registered PF_INET6 protocol family Dec 3 01:41:01 localhost kernel: Segment Routing with IPv6 Dec 3 01:41:01 localhost kernel: NET: Registered PF_PACKET protocol family Dec 3 01:41:01 localhost kernel: mpls_gso: MPLS GSO support Dec 3 01:41:01 localhost kernel: IPI shorthand broadcast: enabled Dec 3 01:41:01 localhost kernel: AVX2 version of gcm_enc/dec engaged. Dec 3 01:41:01 localhost kernel: AES CTR mode by8 optimization enabled Dec 3 01:41:01 localhost kernel: sched_clock: Marking stable (802374133, 185257146)->(1120279840, -132648561) Dec 3 01:41:01 localhost kernel: registered taskstats version 1 Dec 3 01:41:01 localhost kernel: Loading compiled-in X.509 certificates Dec 3 01:41:01 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Dec 3 01:41:01 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Dec 3 01:41:01 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Dec 3 01:41:01 localhost kernel: zswap: loaded using pool lzo/zbud Dec 3 01:41:01 localhost kernel: page_owner is disabled Dec 3 01:41:01 localhost kernel: Key type big_key registered Dec 3 01:41:01 localhost kernel: Freeing initrd memory: 74232K Dec 3 01:41:01 localhost kernel: Key type encrypted registered Dec 3 01:41:01 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Dec 3 01:41:01 localhost kernel: Loading compiled-in module X.509 certificates Dec 3 01:41:01 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Dec 3 01:41:01 localhost kernel: ima: Allocated hash algorithm: sha256 Dec 3 01:41:01 localhost kernel: ima: No architecture policies found Dec 3 01:41:01 localhost kernel: evm: Initialising EVM extended attributes: Dec 3 01:41:01 localhost kernel: evm: security.selinux Dec 3 01:41:01 localhost kernel: evm: security.SMACK64 (disabled) Dec 3 01:41:01 localhost kernel: evm: security.SMACK64EXEC (disabled) Dec 3 01:41:01 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Dec 3 01:41:01 localhost kernel: evm: security.SMACK64MMAP (disabled) Dec 3 01:41:01 localhost kernel: evm: security.apparmor (disabled) Dec 3 01:41:01 localhost kernel: evm: security.ima Dec 3 01:41:01 localhost kernel: evm: security.capability Dec 3 01:41:01 localhost kernel: evm: HMAC attrs: 0x1 Dec 3 01:41:01 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Dec 3 01:41:01 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Dec 3 01:41:01 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Dec 3 01:41:01 localhost kernel: usb 1-1: Product: QEMU USB Tablet Dec 3 01:41:01 localhost kernel: usb 1-1: Manufacturer: QEMU Dec 3 01:41:01 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Dec 3 01:41:01 localhost kernel: Freeing unused decrypted memory: 2036K Dec 3 01:41:01 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Dec 3 01:41:01 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Dec 3 01:41:01 localhost kernel: Write protecting the kernel read-only data: 26624k Dec 3 01:41:01 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Dec 3 01:41:01 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 3 01:41:01 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Dec 3 01:41:01 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Dec 3 01:41:01 localhost kernel: Run /init as init process Dec 3 01:41:01 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 3 01:41:01 localhost systemd[1]: Detected virtualization kvm. Dec 3 01:41:01 localhost systemd[1]: Detected architecture x86-64. Dec 3 01:41:01 localhost systemd[1]: Running in initrd. Dec 3 01:41:01 localhost systemd[1]: No hostname configured, using default hostname. Dec 3 01:41:01 localhost systemd[1]: Hostname set to . Dec 3 01:41:01 localhost systemd[1]: Initializing machine ID from VM UUID. Dec 3 01:41:01 localhost systemd[1]: Queued start job for default target Initrd Default Target. Dec 3 01:41:01 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 3 01:41:01 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 3 01:41:01 localhost systemd[1]: Reached target Initrd /usr File System. Dec 3 01:41:01 localhost systemd[1]: Reached target Local File Systems. Dec 3 01:41:01 localhost systemd[1]: Reached target Path Units. Dec 3 01:41:01 localhost systemd[1]: Reached target Slice Units. Dec 3 01:41:01 localhost systemd[1]: Reached target Swaps. Dec 3 01:41:01 localhost systemd[1]: Reached target Timer Units. Dec 3 01:41:01 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 3 01:41:01 localhost systemd[1]: Listening on Journal Socket (/dev/log). Dec 3 01:41:01 localhost systemd[1]: Listening on Journal Socket. Dec 3 01:41:01 localhost systemd[1]: Listening on udev Control Socket. Dec 3 01:41:01 localhost systemd[1]: Listening on udev Kernel Socket. Dec 3 01:41:01 localhost systemd[1]: Reached target Socket Units. Dec 3 01:41:01 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 3 01:41:01 localhost systemd[1]: Starting Journal Service... Dec 3 01:41:01 localhost systemd[1]: Starting Load Kernel Modules... Dec 3 01:41:01 localhost systemd[1]: Starting Create System Users... Dec 3 01:41:01 localhost systemd[1]: Starting Setup Virtual Console... Dec 3 01:41:01 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 3 01:41:01 localhost systemd[1]: Finished Load Kernel Modules. Dec 3 01:41:01 localhost systemd[1]: Starting Apply Kernel Variables... Dec 3 01:41:01 localhost systemd-journald[284]: Journal started Dec 3 01:41:01 localhost systemd-journald[284]: Runtime Journal (/run/log/journal/8359999bd4a6430280fe507ba48cb082) is 8.0M, max 314.7M, 306.7M free. Dec 3 01:41:01 localhost systemd-modules-load[285]: Module 'msr' is built in Dec 3 01:41:01 localhost systemd[1]: Started Journal Service. Dec 3 01:41:01 localhost systemd[1]: Finished Setup Virtual Console. Dec 3 01:41:01 localhost systemd[1]: Finished Apply Kernel Variables. Dec 3 01:41:01 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Dec 3 01:41:01 localhost systemd[1]: Starting dracut cmdline hook... Dec 3 01:41:01 localhost systemd-sysusers[286]: Creating group 'sgx' with GID 997. Dec 3 01:41:01 localhost systemd-sysusers[286]: Creating group 'users' with GID 100. Dec 3 01:41:01 localhost systemd-sysusers[286]: Creating group 'dbus' with GID 81. Dec 3 01:41:01 localhost systemd-sysusers[286]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Dec 3 01:41:01 localhost systemd[1]: Finished Create System Users. Dec 3 01:41:01 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 3 01:41:01 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 3 01:41:01 localhost dracut-cmdline[291]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Dec 3 01:41:01 localhost dracut-cmdline[291]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Dec 3 01:41:01 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 3 01:41:01 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 3 01:41:01 localhost systemd[1]: Finished dracut cmdline hook. Dec 3 01:41:01 localhost systemd[1]: Starting dracut pre-udev hook... Dec 3 01:41:01 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 3 01:41:01 localhost kernel: device-mapper: uevent: version 1.0.3 Dec 3 01:41:01 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Dec 3 01:41:01 localhost kernel: RPC: Registered named UNIX socket transport module. Dec 3 01:41:01 localhost kernel: RPC: Registered udp transport module. Dec 3 01:41:01 localhost kernel: RPC: Registered tcp transport module. Dec 3 01:41:01 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 3 01:41:01 localhost rpc.statd[407]: Version 2.5.4 starting Dec 3 01:41:01 localhost rpc.statd[407]: Initializing NSM state Dec 3 01:41:01 localhost rpc.idmapd[412]: Setting log level to 0 Dec 3 01:41:01 localhost systemd[1]: Finished dracut pre-udev hook. Dec 3 01:41:01 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 3 01:41:01 localhost systemd-udevd[425]: Using default interface naming scheme 'rhel-9.0'. Dec 3 01:41:01 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 3 01:41:01 localhost systemd[1]: Starting dracut pre-trigger hook... Dec 3 01:41:01 localhost systemd[1]: Finished dracut pre-trigger hook. Dec 3 01:41:01 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 3 01:41:01 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 3 01:41:01 localhost systemd[1]: Reached target System Initialization. Dec 3 01:41:01 localhost systemd[1]: Reached target Basic System. Dec 3 01:41:01 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 3 01:41:01 localhost systemd[1]: Reached target Network. Dec 3 01:41:01 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 3 01:41:01 localhost systemd[1]: Starting dracut initqueue hook... Dec 3 01:41:01 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Dec 3 01:41:01 localhost kernel: scsi host0: ata_piix Dec 3 01:41:01 localhost kernel: scsi host1: ata_piix Dec 3 01:41:01 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Dec 3 01:41:01 localhost systemd-udevd[442]: Network interface NamePolicy= disabled on kernel command line. Dec 3 01:41:01 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 3 01:41:01 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Dec 3 01:41:01 localhost kernel: GPT:20971519 != 838860799 Dec 3 01:41:01 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Dec 3 01:41:01 localhost kernel: GPT:20971519 != 838860799 Dec 3 01:41:01 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Dec 3 01:41:01 localhost kernel: vda: vda1 vda2 vda3 vda4 Dec 3 01:41:01 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Dec 3 01:41:01 localhost systemd[1]: Reached target Initrd Root Device. Dec 3 01:41:02 localhost kernel: ata1: found unknown device (class 0) Dec 3 01:41:02 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 3 01:41:02 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 3 01:41:02 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Dec 3 01:41:02 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 3 01:41:02 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 3 01:41:02 localhost systemd[1]: Finished dracut initqueue hook. Dec 3 01:41:02 localhost systemd[1]: Reached target Preparation for Remote File Systems. Dec 3 01:41:02 localhost systemd[1]: Reached target Remote Encrypted Volumes. Dec 3 01:41:02 localhost systemd[1]: Reached target Remote File Systems. Dec 3 01:41:02 localhost systemd[1]: Starting dracut pre-mount hook... Dec 3 01:41:02 localhost systemd[1]: Finished dracut pre-mount hook. Dec 3 01:41:02 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Dec 3 01:41:02 localhost systemd-fsck[511]: /usr/sbin/fsck.xfs: XFS file system. Dec 3 01:41:02 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Dec 3 01:41:02 localhost systemd[1]: Mounting /sysroot... Dec 3 01:41:02 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Dec 3 01:41:02 localhost kernel: XFS (vda4): Mounting V5 Filesystem Dec 3 01:41:02 localhost kernel: XFS (vda4): Ending clean mount Dec 3 01:41:02 localhost systemd[1]: Mounted /sysroot. Dec 3 01:41:02 localhost systemd[1]: Reached target Initrd Root File System. Dec 3 01:41:02 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Dec 3 01:41:02 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Dec 3 01:41:02 localhost systemd[1]: Reached target Initrd File Systems. Dec 3 01:41:02 localhost systemd[1]: Reached target Initrd Default Target. Dec 3 01:41:02 localhost systemd[1]: Starting dracut mount hook... Dec 3 01:41:02 localhost systemd[1]: Finished dracut mount hook. Dec 3 01:41:02 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Dec 3 01:41:02 localhost rpc.idmapd[412]: exiting on signal 15 Dec 3 01:41:02 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Dec 3 01:41:02 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Dec 3 01:41:02 localhost systemd[1]: Stopped target Network. Dec 3 01:41:02 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Dec 3 01:41:02 localhost systemd[1]: Stopped target Timer Units. Dec 3 01:41:02 localhost systemd[1]: dbus.socket: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Dec 3 01:41:02 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Dec 3 01:41:02 localhost systemd[1]: Stopped target Initrd Default Target. Dec 3 01:41:02 localhost systemd[1]: Stopped target Basic System. Dec 3 01:41:02 localhost systemd[1]: Stopped target Initrd Root Device. Dec 3 01:41:02 localhost systemd[1]: Stopped target Initrd /usr File System. Dec 3 01:41:02 localhost systemd[1]: Stopped target Path Units. Dec 3 01:41:02 localhost systemd[1]: Stopped target Remote File Systems. Dec 3 01:41:02 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Dec 3 01:41:02 localhost systemd[1]: Stopped target Slice Units. Dec 3 01:41:02 localhost systemd[1]: Stopped target Socket Units. Dec 3 01:41:02 localhost systemd[1]: Stopped target System Initialization. Dec 3 01:41:02 localhost systemd[1]: Stopped target Local File Systems. Dec 3 01:41:02 localhost systemd[1]: Stopped target Swaps. Dec 3 01:41:02 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped dracut mount hook. Dec 3 01:41:02 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped dracut pre-mount hook. Dec 3 01:41:02 localhost systemd[1]: Stopped target Local Encrypted Volumes. Dec 3 01:41:02 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Dec 3 01:41:02 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped dracut initqueue hook. Dec 3 01:41:02 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Apply Kernel Variables. Dec 3 01:41:02 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Load Kernel Modules. Dec 3 01:41:02 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Create Volatile Files and Directories. Dec 3 01:41:02 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Coldplug All udev Devices. Dec 3 01:41:02 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped dracut pre-trigger hook. Dec 3 01:41:02 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Dec 3 01:41:02 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Setup Virtual Console. Dec 3 01:41:02 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Dec 3 01:41:02 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Closed udev Control Socket. Dec 3 01:41:02 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Closed udev Kernel Socket. Dec 3 01:41:02 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped dracut pre-udev hook. Dec 3 01:41:02 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped dracut cmdline hook. Dec 3 01:41:02 localhost systemd[1]: Starting Cleanup udev Database... Dec 3 01:41:02 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Dec 3 01:41:02 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Create List of Static Device Nodes. Dec 3 01:41:02 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Stopped Create System Users. Dec 3 01:41:02 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Dec 3 01:41:02 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 3 01:41:02 localhost systemd[1]: Finished Cleanup udev Database. Dec 3 01:41:02 localhost systemd[1]: Reached target Switch Root. Dec 3 01:41:02 localhost systemd[1]: Starting Switch Root... Dec 3 01:41:02 localhost systemd[1]: Switching root. Dec 3 01:41:02 localhost systemd-journald[284]: Journal stopped Dec 3 01:41:03 localhost systemd-journald[284]: Received SIGTERM from PID 1 (systemd). Dec 3 01:41:03 localhost kernel: audit: type=1404 audit(1764744062.988:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Dec 3 01:41:03 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 01:41:03 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 01:41:03 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 01:41:03 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 01:41:03 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 01:41:03 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 01:41:03 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 01:41:03 localhost kernel: audit: type=1403 audit(1764744063.070:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 3 01:41:03 localhost systemd[1]: Successfully loaded SELinux policy in 85.047ms. Dec 3 01:41:03 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.450ms. Dec 3 01:41:03 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 3 01:41:03 localhost systemd[1]: Detected virtualization kvm. Dec 3 01:41:03 localhost systemd[1]: Detected architecture x86-64. Dec 3 01:41:03 localhost systemd-rc-local-generator[581]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 01:41:03 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 01:41:03 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 3 01:41:03 localhost systemd[1]: Stopped Switch Root. Dec 3 01:41:03 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 3 01:41:03 localhost systemd[1]: Created slice Slice /system/getty. Dec 3 01:41:03 localhost systemd[1]: Created slice Slice /system/modprobe. Dec 3 01:41:03 localhost systemd[1]: Created slice Slice /system/serial-getty. Dec 3 01:41:03 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Dec 3 01:41:03 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Dec 3 01:41:03 localhost systemd[1]: Created slice User and Session Slice. Dec 3 01:41:03 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 3 01:41:03 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Dec 3 01:41:03 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Dec 3 01:41:03 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 3 01:41:03 localhost systemd[1]: Stopped target Switch Root. Dec 3 01:41:03 localhost systemd[1]: Stopped target Initrd File Systems. Dec 3 01:41:03 localhost systemd[1]: Stopped target Initrd Root File System. Dec 3 01:41:03 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Dec 3 01:41:03 localhost systemd[1]: Reached target Path Units. Dec 3 01:41:03 localhost systemd[1]: Reached target rpc_pipefs.target. Dec 3 01:41:03 localhost systemd[1]: Reached target Slice Units. Dec 3 01:41:03 localhost systemd[1]: Reached target Swaps. Dec 3 01:41:03 localhost systemd[1]: Reached target Local Verity Protected Volumes. Dec 3 01:41:03 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Dec 3 01:41:03 localhost systemd[1]: Reached target RPC Port Mapper. Dec 3 01:41:03 localhost systemd[1]: Listening on Process Core Dump Socket. Dec 3 01:41:03 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Dec 3 01:41:03 localhost systemd[1]: Listening on udev Control Socket. Dec 3 01:41:03 localhost systemd[1]: Listening on udev Kernel Socket. Dec 3 01:41:03 localhost systemd[1]: Mounting Huge Pages File System... Dec 3 01:41:03 localhost systemd[1]: Mounting POSIX Message Queue File System... Dec 3 01:41:03 localhost systemd[1]: Mounting Kernel Debug File System... Dec 3 01:41:03 localhost systemd[1]: Mounting Kernel Trace File System... Dec 3 01:41:03 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 3 01:41:03 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 3 01:41:03 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 3 01:41:03 localhost systemd[1]: Starting Load Kernel Module drm... Dec 3 01:41:03 localhost systemd[1]: Starting Load Kernel Module fuse... Dec 3 01:41:03 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Dec 3 01:41:03 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 3 01:41:03 localhost systemd[1]: Stopped File System Check on Root Device. Dec 3 01:41:03 localhost systemd[1]: Stopped Journal Service. Dec 3 01:41:03 localhost systemd[1]: Starting Journal Service... Dec 3 01:41:03 localhost systemd[1]: Starting Load Kernel Modules... Dec 3 01:41:03 localhost systemd[1]: Starting Generate network units from Kernel command line... Dec 3 01:41:03 localhost kernel: fuse: init (API version 7.36) Dec 3 01:41:03 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Dec 3 01:41:03 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Dec 3 01:41:03 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 3 01:41:03 localhost systemd-journald[617]: Journal started Dec 3 01:41:03 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/091dc475157499b18701a707a9102fd4) is 8.0M, max 314.7M, 306.7M free. Dec 3 01:41:03 localhost systemd[1]: Queued start job for default target Multi-User System. Dec 3 01:41:03 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Dec 3 01:41:03 localhost systemd-modules-load[618]: Module 'msr' is built in Dec 3 01:41:03 localhost systemd[1]: Started Journal Service. Dec 3 01:41:03 localhost systemd[1]: Mounted Huge Pages File System. Dec 3 01:41:03 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Dec 3 01:41:03 localhost systemd[1]: Mounted POSIX Message Queue File System. Dec 3 01:41:03 localhost systemd[1]: Mounted Kernel Debug File System. Dec 3 01:41:03 localhost systemd[1]: Mounted Kernel Trace File System. Dec 3 01:41:03 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 3 01:41:03 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 3 01:41:03 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 3 01:41:03 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 3 01:41:03 localhost systemd[1]: Finished Load Kernel Module fuse. Dec 3 01:41:03 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Dec 3 01:41:03 localhost kernel: ACPI: bus type drm_connector registered Dec 3 01:41:03 localhost systemd[1]: Finished Load Kernel Modules. Dec 3 01:41:03 localhost systemd[1]: Finished Generate network units from Kernel command line. Dec 3 01:41:03 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 3 01:41:03 localhost systemd[1]: Finished Load Kernel Module drm. Dec 3 01:41:03 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Dec 3 01:41:03 localhost systemd[1]: Mounting FUSE Control File System... Dec 3 01:41:03 localhost systemd[1]: Mounting Kernel Configuration File System... Dec 3 01:41:03 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 3 01:41:03 localhost systemd[1]: Starting Rebuild Hardware Database... Dec 3 01:41:03 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Dec 3 01:41:03 localhost systemd[1]: Starting Load/Save Random Seed... Dec 3 01:41:03 localhost systemd[1]: Starting Apply Kernel Variables... Dec 3 01:41:03 localhost systemd-journald[617]: Runtime Journal (/run/log/journal/091dc475157499b18701a707a9102fd4) is 8.0M, max 314.7M, 306.7M free. Dec 3 01:41:03 localhost systemd-journald[617]: Received client request to flush runtime journal. Dec 3 01:41:03 localhost systemd[1]: Starting Create System Users... Dec 3 01:41:03 localhost systemd[1]: Mounted FUSE Control File System. Dec 3 01:41:03 localhost systemd[1]: Mounted Kernel Configuration File System. Dec 3 01:41:03 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Dec 3 01:41:03 localhost systemd[1]: Finished Apply Kernel Variables. Dec 3 01:41:03 localhost systemd[1]: Finished Load/Save Random Seed. Dec 3 01:41:03 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 3 01:41:03 localhost systemd-sysusers[630]: Creating group 'sgx' with GID 989. Dec 3 01:41:03 localhost systemd-sysusers[630]: Creating group 'systemd-oom' with GID 988. Dec 3 01:41:03 localhost systemd-sysusers[630]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Dec 3 01:41:03 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 3 01:41:03 localhost systemd[1]: Finished Create System Users. Dec 3 01:41:03 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 3 01:41:03 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 3 01:41:03 localhost systemd[1]: Reached target Preparation for Local File Systems. Dec 3 01:41:03 localhost systemd[1]: Set up automount EFI System Partition Automount. Dec 3 01:41:04 localhost systemd[1]: Finished Rebuild Hardware Database. Dec 3 01:41:04 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 3 01:41:04 localhost systemd-udevd[634]: Using default interface naming scheme 'rhel-9.0'. Dec 3 01:41:04 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 3 01:41:04 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 3 01:41:04 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 3 01:41:04 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 3 01:41:04 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Dec 3 01:41:04 localhost systemd-udevd[653]: Network interface NamePolicy= disabled on kernel command line. Dec 3 01:41:04 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Dec 3 01:41:04 localhost systemd[1]: Mounting /boot... Dec 3 01:41:04 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Dec 3 01:41:04 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Dec 3 01:41:04 localhost kernel: XFS (vda3): Mounting V5 Filesystem Dec 3 01:41:04 localhost systemd-fsck[684]: fsck.fat 4.2 (2021-01-31) Dec 3 01:41:04 localhost systemd-fsck[684]: /dev/vda2: 12 files, 1782/51145 clusters Dec 3 01:41:04 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Dec 3 01:41:04 localhost kernel: XFS (vda3): Ending clean mount Dec 3 01:41:04 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Dec 3 01:41:04 localhost systemd[1]: Mounted /boot. Dec 3 01:41:04 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 3 01:41:04 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Dec 3 01:41:04 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Dec 3 01:41:04 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Dec 3 01:41:04 localhost kernel: Console: switching to colour dummy device 80x25 Dec 3 01:41:04 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Dec 3 01:41:04 localhost kernel: [drm] features: -context_init Dec 3 01:41:04 localhost kernel: [drm] number of scanouts: 1 Dec 3 01:41:04 localhost kernel: [drm] number of cap sets: 0 Dec 3 01:41:04 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Dec 3 01:41:04 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Dec 3 01:41:04 localhost kernel: Console: switching to colour frame buffer device 128x48 Dec 3 01:41:04 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Dec 3 01:41:04 localhost kernel: SVM: TSC scaling supported Dec 3 01:41:04 localhost kernel: kvm: Nested Virtualization enabled Dec 3 01:41:04 localhost kernel: SVM: kvm: Nested Paging enabled Dec 3 01:41:04 localhost kernel: SVM: LBR virtualization supported Dec 3 01:41:04 localhost systemd[1]: Mounting /boot/efi... Dec 3 01:41:04 localhost systemd[1]: Mounted /boot/efi. Dec 3 01:41:04 localhost systemd[1]: Reached target Local File Systems. Dec 3 01:41:04 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Dec 3 01:41:04 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Dec 3 01:41:04 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Dec 3 01:41:04 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 3 01:41:04 localhost systemd[1]: Starting Automatic Boot Loader Update... Dec 3 01:41:04 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Dec 3 01:41:04 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 3 01:41:04 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 705 (bootctl) Dec 3 01:41:04 localhost systemd[1]: Starting File System Check on /dev/vda2... Dec 3 01:41:04 localhost systemd[1]: Finished File System Check on /dev/vda2. Dec 3 01:41:04 localhost systemd[1]: Mounting EFI System Partition Automount... Dec 3 01:41:04 localhost systemd[1]: Mounted EFI System Partition Automount. Dec 3 01:41:04 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 3 01:41:04 localhost systemd[1]: Finished Automatic Boot Loader Update. Dec 3 01:41:04 localhost systemd[1]: Starting Security Auditing Service... Dec 3 01:41:04 localhost systemd[1]: Starting RPC Bind... Dec 3 01:41:04 localhost systemd[1]: Starting Rebuild Journal Catalog... Dec 3 01:41:04 localhost systemd[1]: Started RPC Bind. Dec 3 01:41:04 localhost auditd[721]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Dec 3 01:41:04 localhost systemd[1]: Finished Rebuild Journal Catalog. Dec 3 01:41:04 localhost auditd[721]: Init complete, auditd 3.0.7 listening for events (startup state enable) Dec 3 01:41:04 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Dec 3 01:41:04 localhost systemd[1]: Starting Update is Completed... Dec 3 01:41:04 localhost augenrules[727]: /sbin/augenrules: No change Dec 3 01:41:04 localhost systemd[1]: Finished Update is Completed. Dec 3 01:41:04 localhost augenrules[741]: No rules Dec 3 01:41:04 localhost augenrules[741]: enabled 1 Dec 3 01:41:04 localhost augenrules[741]: failure 1 Dec 3 01:41:04 localhost augenrules[741]: pid 721 Dec 3 01:41:04 localhost augenrules[741]: rate_limit 0 Dec 3 01:41:04 localhost augenrules[741]: backlog_limit 8192 Dec 3 01:41:04 localhost augenrules[741]: lost 0 Dec 3 01:41:04 localhost augenrules[741]: backlog 0 Dec 3 01:41:04 localhost augenrules[741]: backlog_wait_time 60000 Dec 3 01:41:04 localhost augenrules[741]: backlog_wait_time_actual 0 Dec 3 01:41:04 localhost augenrules[741]: enabled 1 Dec 3 01:41:04 localhost augenrules[741]: failure 1 Dec 3 01:41:04 localhost augenrules[741]: pid 721 Dec 3 01:41:04 localhost augenrules[741]: rate_limit 0 Dec 3 01:41:04 localhost augenrules[741]: backlog_limit 8192 Dec 3 01:41:04 localhost augenrules[741]: lost 0 Dec 3 01:41:04 localhost augenrules[741]: backlog 3 Dec 3 01:41:04 localhost augenrules[741]: backlog_wait_time 60000 Dec 3 01:41:04 localhost augenrules[741]: backlog_wait_time_actual 0 Dec 3 01:41:04 localhost augenrules[741]: enabled 1 Dec 3 01:41:04 localhost augenrules[741]: failure 1 Dec 3 01:41:04 localhost augenrules[741]: pid 721 Dec 3 01:41:04 localhost augenrules[741]: rate_limit 0 Dec 3 01:41:04 localhost augenrules[741]: backlog_limit 8192 Dec 3 01:41:04 localhost augenrules[741]: lost 0 Dec 3 01:41:04 localhost augenrules[741]: backlog 2 Dec 3 01:41:04 localhost augenrules[741]: backlog_wait_time 60000 Dec 3 01:41:04 localhost augenrules[741]: backlog_wait_time_actual 0 Dec 3 01:41:04 localhost systemd[1]: Started Security Auditing Service. Dec 3 01:41:04 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Dec 3 01:41:04 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Dec 3 01:41:04 localhost systemd[1]: Reached target System Initialization. Dec 3 01:41:04 localhost systemd[1]: Started dnf makecache --timer. Dec 3 01:41:04 localhost systemd[1]: Started Daily rotation of log files. Dec 3 01:41:04 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Dec 3 01:41:04 localhost systemd[1]: Reached target Timer Units. Dec 3 01:41:04 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 3 01:41:04 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Dec 3 01:41:04 localhost systemd[1]: Reached target Socket Units. Dec 3 01:41:04 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Dec 3 01:41:04 localhost systemd[1]: Starting D-Bus System Message Bus... Dec 3 01:41:04 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 3 01:41:04 localhost systemd[1]: Started D-Bus System Message Bus. Dec 3 01:41:04 localhost systemd[1]: Reached target Basic System. Dec 3 01:41:04 localhost journal[750]: Ready Dec 3 01:41:04 localhost systemd[1]: Starting NTP client/server... Dec 3 01:41:04 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Dec 3 01:41:04 localhost systemd[1]: Started irqbalance daemon. Dec 3 01:41:04 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Dec 3 01:41:04 localhost systemd[1]: Starting System Logging Service... Dec 3 01:41:04 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 01:41:04 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 01:41:04 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 01:41:04 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 01:41:04 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Dec 3 01:41:04 localhost systemd[1]: Reached target User and Group Name Lookups. Dec 3 01:41:04 localhost systemd[1]: Starting User Login Management... Dec 3 01:41:04 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Dec 3 01:41:04 localhost systemd[1]: Started System Logging Service. Dec 3 01:41:04 localhost rsyslogd[758]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="758" x-info="https://www.rsyslog.com"] start Dec 3 01:41:04 localhost rsyslogd[758]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Dec 3 01:41:04 localhost chronyd[765]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Dec 3 01:41:04 localhost chronyd[765]: Using right/UTC timezone to obtain leap second data Dec 3 01:41:04 localhost chronyd[765]: Loaded seccomp filter (level 2) Dec 3 01:41:04 localhost systemd[1]: Started NTP client/server. Dec 3 01:41:04 localhost systemd-logind[759]: New seat seat0. Dec 3 01:41:04 localhost systemd-logind[759]: Watching system buttons on /dev/input/event0 (Power Button) Dec 3 01:41:04 localhost systemd-logind[759]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 3 01:41:04 localhost systemd[1]: Started User Login Management. Dec 3 01:41:04 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 01:41:05 localhost cloud-init[769]: Cloud-init v. 22.1-9.el9 running 'init-local' at Wed, 03 Dec 2025 06:41:05 +0000. Up 5.39 seconds. Dec 3 01:41:05 localhost systemd[1]: Starting Hostname Service... Dec 3 01:41:05 localhost systemd[1]: Started Hostname Service. Dec 3 01:41:05 localhost systemd-hostnamed[783]: Hostname set to (static) Dec 3 01:41:05 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpeg6am5fz.mount: Deactivated successfully. Dec 3 01:41:05 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Dec 3 01:41:05 localhost systemd[1]: Reached target Preparation for Network. Dec 3 01:41:05 localhost systemd[1]: Starting Network Manager... Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.5924] NetworkManager (version 1.42.2-1.el9) is starting... (boot:bedfd171-6426-49b5-a6ed-7bd01fd29528) Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.5931] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Dec 3 01:41:05 localhost systemd[1]: Started Network Manager. Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.5964] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Dec 3 01:41:05 localhost systemd[1]: Reached target Network. Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6026] manager[0x556a6b71f020]: monitoring kernel firmware directory '/lib/firmware'. Dec 3 01:41:05 localhost systemd[1]: Starting Network Manager Wait Online... Dec 3 01:41:05 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6106] hostname: hostname: using hostnamed Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6107] hostname: static hostname changed from (none) to "np0005543225.novalocal" Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6115] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Dec 3 01:41:05 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Dec 3 01:41:05 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6212] manager[0x556a6b71f020]: rfkill: Wi-Fi hardware radio set enabled Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6215] manager[0x556a6b71f020]: rfkill: WWAN hardware radio set enabled Dec 3 01:41:05 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Dec 3 01:41:05 localhost systemd[1]: Started GSSAPI Proxy Daemon. Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6261] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6261] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6267] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6268] manager: Networking is enabled by state file Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6285] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6285] settings: Loaded settings plugin: keyfile (internal) Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6316] dhcp: init: Using DHCP client 'internal' Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6319] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6335] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6340] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6350] device (lo): Activation: starting connection 'lo' (cbd96401-3c72-4776-ae2e-84e23eed5754) Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6363] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6369] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Dec 3 01:41:05 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6424] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6427] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6428] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6433] device (eth0): carrier: link connected Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6436] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6442] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6449] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6454] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 3 01:41:05 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 01:41:05 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 3 01:41:05 localhost systemd[1]: Reached target NFS client services. Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6497] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6499] manager: NetworkManager state is now CONNECTING Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6500] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6509] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6512] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:41:05 localhost systemd[1]: Reached target Preparation for Remote File Systems. Dec 3 01:41:05 localhost systemd[1]: Reached target Remote File Systems. Dec 3 01:41:05 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6588] dhcp4 (eth0): state changed new lease, address=38.102.83.198 Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6592] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Dec 3 01:41:05 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6614] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6632] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6634] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6639] device (lo): Activation: successful, device activated. Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6645] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6647] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6650] manager: NetworkManager state is now CONNECTED_SITE Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6653] device (eth0): Activation: successful, device activated. Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6658] manager: NetworkManager state is now CONNECTED_GLOBAL Dec 3 01:41:05 localhost NetworkManager[788]: [1764744065.6662] manager: startup complete Dec 3 01:41:05 localhost systemd[1]: Finished Network Manager Wait Online. Dec 3 01:41:05 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Dec 3 01:41:05 localhost cloud-init[978]: Cloud-init v. 22.1-9.el9 running 'init' at Wed, 03 Dec 2025 06:41:05 +0000. Up 6.19 seconds. Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | eth0 | True | 38.102.83.198 | 255.255.255.0 | global | fa:16:3e:83:be:22 | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | eth0 | True | fe80::f816:3eff:fe83:be22/64 | . | link | fa:16:3e:83:be:22 | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | lo | True | ::1/128 | . | host | . | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | Route | Destination | Gateway | Interface | Flags | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Dec 3 01:41:05 localhost cloud-init[978]: ci-info: | 3 | multicast | :: | eth0 | U | Dec 3 01:41:06 localhost cloud-init[978]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 3 01:41:06 localhost systemd[1]: Starting Authorization Manager... Dec 3 01:41:06 localhost systemd[1]: Started Dynamic System Tuning Daemon. Dec 3 01:41:06 localhost polkitd[1035]: Started polkitd version 0.117 Dec 3 01:41:06 localhost systemd[1]: Started Authorization Manager. Dec 3 01:41:08 localhost cloud-init[978]: Generating public/private rsa key pair. Dec 3 01:41:08 localhost cloud-init[978]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Dec 3 01:41:08 localhost cloud-init[978]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Dec 3 01:41:08 localhost cloud-init[978]: The key fingerprint is: Dec 3 01:41:08 localhost cloud-init[978]: SHA256:owyWHUH8vep5xB9b0Rv95j8etf/ZBCvdJxW0dCvm+dI root@np0005543225.novalocal Dec 3 01:41:08 localhost cloud-init[978]: The key's randomart image is: Dec 3 01:41:08 localhost cloud-init[978]: +---[RSA 3072]----+ Dec 3 01:41:08 localhost cloud-init[978]: | oo o.| Dec 3 01:41:08 localhost cloud-init[978]: | .. o +| Dec 3 01:41:08 localhost cloud-init[978]: | .. . o =.| Dec 3 01:41:08 localhost cloud-init[978]: | o .. . o +.+| Dec 3 01:41:08 localhost cloud-init[978]: | + . S. . o..*| Dec 3 01:41:08 localhost cloud-init[978]: | . o . .+ ..+*=| Dec 3 01:41:08 localhost cloud-init[978]: | o o ..=+E+| Dec 3 01:41:08 localhost cloud-init[978]: | ... o..+B| Dec 3 01:41:08 localhost cloud-init[978]: | .o. .oO| Dec 3 01:41:08 localhost cloud-init[978]: +----[SHA256]-----+ Dec 3 01:41:08 localhost cloud-init[978]: Generating public/private ecdsa key pair. Dec 3 01:41:08 localhost cloud-init[978]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Dec 3 01:41:08 localhost cloud-init[978]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Dec 3 01:41:08 localhost cloud-init[978]: The key fingerprint is: Dec 3 01:41:08 localhost cloud-init[978]: SHA256:V2UsrM1rvh6TmYctmTJYvcKI3hrYO0w8k5Vf+6QWgu0 root@np0005543225.novalocal Dec 3 01:41:08 localhost cloud-init[978]: The key's randomart image is: Dec 3 01:41:08 localhost cloud-init[978]: +---[ECDSA 256]---+ Dec 3 01:41:08 localhost cloud-init[978]: | . .o | Dec 3 01:41:08 localhost cloud-init[978]: | oo. | Dec 3 01:41:08 localhost cloud-init[978]: | . +.. | Dec 3 01:41:08 localhost cloud-init[978]: | o .o+ | Dec 3 01:41:08 localhost cloud-init[978]: | . oS+o..o | Dec 3 01:41:08 localhost cloud-init[978]: | o*..*+ =X. | Dec 3 01:41:08 localhost cloud-init[978]: | .o+oo.=+%=o | Dec 3 01:41:08 localhost cloud-init[978]: | .o+ E++=. | Dec 3 01:41:08 localhost cloud-init[978]: | +o. oo. | Dec 3 01:41:08 localhost cloud-init[978]: +----[SHA256]-----+ Dec 3 01:41:08 localhost cloud-init[978]: Generating public/private ed25519 key pair. Dec 3 01:41:08 localhost cloud-init[978]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Dec 3 01:41:08 localhost cloud-init[978]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Dec 3 01:41:08 localhost cloud-init[978]: The key fingerprint is: Dec 3 01:41:08 localhost cloud-init[978]: SHA256:s7Srx5lbITqLeNDWFDkzQQyIBpth2RKHNAZcwrkFUcU root@np0005543225.novalocal Dec 3 01:41:08 localhost cloud-init[978]: The key's randomart image is: Dec 3 01:41:08 localhost cloud-init[978]: +--[ED25519 256]--+ Dec 3 01:41:08 localhost cloud-init[978]: |X@@=+=oo | Dec 3 01:41:08 localhost cloud-init[978]: |+%=o EB | Dec 3 01:41:08 localhost cloud-init[978]: |+ + = | Dec 3 01:41:08 localhost cloud-init[978]: | . . | Dec 3 01:41:08 localhost cloud-init[978]: | . o S . | Dec 3 01:41:08 localhost cloud-init[978]: | . o .o = . | Dec 3 01:41:08 localhost cloud-init[978]: | o o.oo. | Dec 3 01:41:08 localhost cloud-init[978]: | ... o=o | Dec 3 01:41:08 localhost cloud-init[978]: | ... ooo. | Dec 3 01:41:08 localhost cloud-init[978]: +----[SHA256]-----+ Dec 3 01:41:08 localhost sm-notify[1127]: Version 2.5.4 starting Dec 3 01:41:08 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Dec 3 01:41:08 localhost systemd[1]: Reached target Cloud-config availability. Dec 3 01:41:08 localhost systemd[1]: Reached target Network is Online. Dec 3 01:41:08 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Dec 3 01:41:08 localhost sshd[1128]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:08 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Dec 3 01:41:08 localhost systemd[1]: Starting Crash recovery kernel arming... Dec 3 01:41:08 localhost systemd[1]: Starting Notify NFS peers of a restart... Dec 3 01:41:08 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 01:41:08 localhost systemd[1]: Starting Permit User Sessions... Dec 3 01:41:08 localhost systemd[1]: Started Notify NFS peers of a restart. Dec 3 01:41:08 localhost systemd[1]: Finished Permit User Sessions. Dec 3 01:41:08 localhost systemd[1]: Started Command Scheduler. Dec 3 01:41:08 localhost systemd[1]: Started Getty on tty1. Dec 3 01:41:08 localhost systemd[1]: Started Serial Getty on ttyS0. Dec 3 01:41:08 localhost systemd[1]: Reached target Login Prompts. Dec 3 01:41:08 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 01:41:08 localhost systemd[1]: Reached target Multi-User System. Dec 3 01:41:08 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Dec 3 01:41:08 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 3 01:41:08 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Dec 3 01:41:08 localhost kdumpctl[1135]: kdump: No kdump initial ramdisk found. Dec 3 01:41:08 localhost kdumpctl[1135]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Dec 3 01:41:08 localhost cloud-init[1232]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Wed, 03 Dec 2025 06:41:08 +0000. Up 8.66 seconds. Dec 3 01:41:08 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Dec 3 01:41:08 localhost systemd[1]: Starting Execute cloud user/final scripts... Dec 3 01:41:09 localhost dracut[1415]: dracut-057-21.git20230214.el9 Dec 3 01:41:09 localhost cloud-init[1418]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Wed, 03 Dec 2025 06:41:09 +0000. Up 9.30 seconds. Dec 3 01:41:09 localhost cloud-init[1433]: ############################################################# Dec 3 01:41:09 localhost cloud-init[1434]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Dec 3 01:41:09 localhost cloud-init[1436]: 256 SHA256:V2UsrM1rvh6TmYctmTJYvcKI3hrYO0w8k5Vf+6QWgu0 root@np0005543225.novalocal (ECDSA) Dec 3 01:41:09 localhost cloud-init[1441]: 256 SHA256:s7Srx5lbITqLeNDWFDkzQQyIBpth2RKHNAZcwrkFUcU root@np0005543225.novalocal (ED25519) Dec 3 01:41:09 localhost cloud-init[1449]: 3072 SHA256:owyWHUH8vep5xB9b0Rv95j8etf/ZBCvdJxW0dCvm+dI root@np0005543225.novalocal (RSA) Dec 3 01:41:09 localhost cloud-init[1451]: -----END SSH HOST KEY FINGERPRINTS----- Dec 3 01:41:09 localhost dracut[1417]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Dec 3 01:41:09 localhost cloud-init[1454]: ############################################################# Dec 3 01:41:09 localhost cloud-init[1418]: Cloud-init v. 22.1-9.el9 finished at Wed, 03 Dec 2025 06:41:09 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 9.55 seconds Dec 3 01:41:09 localhost systemd[1]: Reloading Network Manager... Dec 3 01:41:09 localhost NetworkManager[788]: [1764744069.4211] audit: op="reload" arg="0" pid=1521 uid=0 result="success" Dec 3 01:41:09 localhost NetworkManager[788]: [1764744069.4223] config: signal: SIGHUP (no changes from disk) Dec 3 01:41:09 localhost systemd[1]: Reloaded Network Manager. Dec 3 01:41:09 localhost systemd[1]: Finished Execute cloud user/final scripts. Dec 3 01:41:09 localhost systemd[1]: Reached target Cloud-init target. Dec 3 01:41:09 localhost dracut[1417]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 3 01:41:09 localhost dracut[1417]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 3 01:41:09 localhost dracut[1417]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 3 01:41:10 localhost dracut[1417]: memstrack is not available Dec 3 01:41:10 localhost dracut[1417]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 3 01:41:10 localhost dracut[1417]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 3 01:41:10 localhost dracut[1417]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 3 01:41:10 localhost dracut[1417]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 3 01:41:10 localhost dracut[1417]: memstrack is not available Dec 3 01:41:10 localhost dracut[1417]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 3 01:41:10 localhost dracut[1417]: *** Including module: systemd *** Dec 3 01:41:10 localhost dracut[1417]: *** Including module: systemd-initrd *** Dec 3 01:41:10 localhost dracut[1417]: *** Including module: i18n *** Dec 3 01:41:10 localhost dracut[1417]: No KEYMAP configured. Dec 3 01:41:10 localhost dracut[1417]: *** Including module: drm *** Dec 3 01:41:10 localhost chronyd[765]: Selected source 149.56.19.163 (2.rhel.pool.ntp.org) Dec 3 01:41:10 localhost chronyd[765]: System clock TAI offset set to 37 seconds Dec 3 01:41:11 localhost dracut[1417]: *** Including module: prefixdevname *** Dec 3 01:41:11 localhost dracut[1417]: *** Including module: kernel-modules *** Dec 3 01:41:11 localhost dracut[1417]: *** Including module: kernel-modules-extra *** Dec 3 01:41:12 localhost dracut[1417]: *** Including module: qemu *** Dec 3 01:41:12 localhost dracut[1417]: *** Including module: fstab-sys *** Dec 3 01:41:12 localhost dracut[1417]: *** Including module: rootfs-block *** Dec 3 01:41:12 localhost dracut[1417]: *** Including module: terminfo *** Dec 3 01:41:12 localhost dracut[1417]: *** Including module: udev-rules *** Dec 3 01:41:12 localhost dracut[1417]: Skipping udev rule: 91-permissions.rules Dec 3 01:41:12 localhost dracut[1417]: Skipping udev rule: 80-drivers-modprobe.rules Dec 3 01:41:12 localhost dracut[1417]: *** Including module: virtiofs *** Dec 3 01:41:12 localhost dracut[1417]: *** Including module: dracut-systemd *** Dec 3 01:41:12 localhost dracut[1417]: *** Including module: usrmount *** Dec 3 01:41:12 localhost dracut[1417]: *** Including module: base *** Dec 3 01:41:13 localhost dracut[1417]: *** Including module: fs-lib *** Dec 3 01:41:13 localhost dracut[1417]: *** Including module: kdumpbase *** Dec 3 01:41:13 localhost dracut[1417]: *** Including module: microcode_ctl-fw_dir_override *** Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl module: mangling fw_dir Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: configuration "intel" is ignored Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: configuration "intel-06-2d-07" is ignored Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: configuration "intel-06-4e-03" is ignored Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: configuration "intel-06-4f-01" is ignored Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: configuration "intel-06-55-04" is ignored Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: configuration "intel-06-5e-03" is ignored Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: configuration "intel-06-8c-01" is ignored Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Dec 3 01:41:13 localhost dracut[1417]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Dec 3 01:41:13 localhost dracut[1417]: *** Including module: shutdown *** Dec 3 01:41:13 localhost dracut[1417]: *** Including module: squash *** Dec 3 01:41:13 localhost dracut[1417]: *** Including modules done *** Dec 3 01:41:13 localhost dracut[1417]: *** Installing kernel module dependencies *** Dec 3 01:41:14 localhost dracut[1417]: *** Installing kernel module dependencies done *** Dec 3 01:41:14 localhost dracut[1417]: *** Resolving executable dependencies *** Dec 3 01:41:15 localhost sshd[3597]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost sshd[3616]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost sshd[3631]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost sshd[3650]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost sshd[3664]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost sshd[3672]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost sshd[3688]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 01:41:15 localhost sshd[3708]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost sshd[3722]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:15 localhost dracut[1417]: *** Resolving executable dependencies done *** Dec 3 01:41:15 localhost dracut[1417]: *** Hardlinking files *** Dec 3 01:41:16 localhost dracut[1417]: Mode: real Dec 3 01:41:16 localhost dracut[1417]: Files: 1099 Dec 3 01:41:16 localhost dracut[1417]: Linked: 3 files Dec 3 01:41:16 localhost dracut[1417]: Compared: 0 xattrs Dec 3 01:41:16 localhost dracut[1417]: Compared: 373 files Dec 3 01:41:16 localhost dracut[1417]: Saved: 61.04 KiB Dec 3 01:41:16 localhost dracut[1417]: Duration: 0.023066 seconds Dec 3 01:41:16 localhost dracut[1417]: *** Hardlinking files done *** Dec 3 01:41:16 localhost dracut[1417]: Could not find 'strip'. Not stripping the initramfs. Dec 3 01:41:16 localhost dracut[1417]: *** Generating early-microcode cpio image *** Dec 3 01:41:16 localhost dracut[1417]: *** Constructing AuthenticAMD.bin *** Dec 3 01:41:16 localhost dracut[1417]: *** Store current command line parameters *** Dec 3 01:41:16 localhost dracut[1417]: Stored kernel commandline: Dec 3 01:41:16 localhost dracut[1417]: No dracut internal kernel commandline stored in the initramfs Dec 3 01:41:16 localhost dracut[1417]: *** Install squash loader *** Dec 3 01:41:16 localhost dracut[1417]: *** Squashing the files inside the initramfs *** Dec 3 01:41:17 localhost dracut[1417]: *** Squashing the files inside the initramfs done *** Dec 3 01:41:17 localhost dracut[1417]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Dec 3 01:41:17 localhost dracut[1417]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Dec 3 01:41:18 localhost kdumpctl[1135]: kdump: kexec: loaded kdump kernel Dec 3 01:41:18 localhost kdumpctl[1135]: kdump: Starting kdump: [OK] Dec 3 01:41:18 localhost systemd[1]: Finished Crash recovery kernel arming. Dec 3 01:41:18 localhost systemd[1]: Startup finished in 1.242s (kernel) + 2.008s (initrd) + 15.475s (userspace) = 18.726s. Dec 3 01:41:35 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 01:41:58 localhost sshd[4172]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:58 localhost systemd[1]: Created slice User Slice of UID 1000. Dec 3 01:41:58 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Dec 3 01:41:58 localhost systemd-logind[759]: New session 1 of user zuul. Dec 3 01:41:58 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Dec 3 01:41:58 localhost systemd[1]: Starting User Manager for UID 1000... Dec 3 01:41:58 localhost systemd[4176]: Queued start job for default target Main User Target. Dec 3 01:41:58 localhost systemd[4176]: Created slice User Application Slice. Dec 3 01:41:58 localhost systemd[4176]: Started Mark boot as successful after the user session has run 2 minutes. Dec 3 01:41:58 localhost systemd[4176]: Started Daily Cleanup of User's Temporary Directories. Dec 3 01:41:58 localhost systemd[4176]: Reached target Paths. Dec 3 01:41:58 localhost systemd[4176]: Reached target Timers. Dec 3 01:41:58 localhost systemd[4176]: Starting D-Bus User Message Bus Socket... Dec 3 01:41:58 localhost systemd[4176]: Starting Create User's Volatile Files and Directories... Dec 3 01:41:58 localhost systemd[4176]: Finished Create User's Volatile Files and Directories. Dec 3 01:41:58 localhost systemd[4176]: Listening on D-Bus User Message Bus Socket. Dec 3 01:41:58 localhost systemd[4176]: Reached target Sockets. Dec 3 01:41:58 localhost systemd[4176]: Reached target Basic System. Dec 3 01:41:58 localhost systemd[4176]: Reached target Main User Target. Dec 3 01:41:58 localhost systemd[4176]: Startup finished in 118ms. Dec 3 01:41:58 localhost systemd[1]: Started User Manager for UID 1000. Dec 3 01:41:58 localhost systemd[1]: Started Session 1 of User zuul. Dec 3 01:41:59 localhost python3[4228]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:04 localhost python3[4246]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:15 localhost python3[4299]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:16 localhost python3[4329]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Dec 3 01:42:19 localhost python3[4345]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:20 localhost python3[4359]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:21 localhost python3[4418]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:21 localhost python3[4459]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764744140.816834-341-101253432534104/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa follow=False checksum=9b3b0b96dc6fc77189c35f68399e9ed1b064c3ee backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:22 localhost python3[4532]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:23 localhost python3[4573]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764744142.4381387-440-89852125207233/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa.pub follow=False checksum=46a348b05953740ee1ba05abb28a06a2e244afc4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:25 localhost python3[4602]: ansible-ping Invoked with data=pong Dec 3 01:42:27 localhost python3[4616]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:30 localhost python3[4669]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Dec 3 01:42:32 localhost python3[4691]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:32 localhost python3[4705]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:33 localhost python3[4719]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:34 localhost python3[4733]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:34 localhost python3[4747]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:34 localhost python3[4761]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:37 localhost python3[4777]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:38 localhost python3[4825]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:39 localhost python3[4868]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744158.3115392-54-85280717655327/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:40 localhost python3[4896]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:40 localhost python3[4910]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4924]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4938]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4952]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4966]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[4980]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDLOQd4ZLtkZXQGY6UwAr/06ppWQK4fDO3HaqxPk98csyOCBXsliSKK39Bso828+5srIXiW7aI6aC9P5mwi4mUZlGPfJlQbfrcGvY+b/SocuvaGK+1RrHLoJCT52LBhwgrzlXio2jeksZeein8iaTrhsPrOAs7KggIL/rB9hEiB3NaOPWhhoCP4vlW6MEMExGcqB/1FVxXFBPnLkEyW0Lk7ycVflZl2ocRxbfjZi0+tI1Wlinp8PvSQSc/WVrAcDgKjc/mB4ODPOyYy3G8FHgfMsrXSDEyjBKgLKMsdCrAUcqJQWjkqXleXSYOV4q3pzL+9umK+q/e3P/bIoSFQzmJKTU1eDfuvPXmow9F5H54fii/Da7ezlMJ+wPGHJrRAkmzvMbALy7xwswLhZMkOGNtRcPqaKYRmIBKpw3o6bCTtcNUHOtOQnzwY8JzrM2eBWJBXAANYw+9/ho80JIiwhg29CFNpVBuHbql2YxJQNrnl90guN65rYNpDxdIluweyUf8= anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[4994]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[5008]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[5022]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5036]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5050]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5064]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5078]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5092]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5106]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5120]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5134]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5148]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5162]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5176]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5190]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5204]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5218]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5232]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:47 localhost python3[5246]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:55 localhost python3[5262]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Dec 3 01:42:55 localhost systemd[1]: Starting Time & Date Service... Dec 3 01:42:55 localhost systemd[1]: Started Time & Date Service. Dec 3 01:42:55 localhost systemd-timedated[5264]: Changed time zone to 'UTC' (UTC). Dec 3 01:42:57 localhost python3[5283]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:58 localhost python3[5329]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:58 localhost python3[5370]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1764744178.0574436-450-48737966468816/source _original_basename=tmpppgr2250 follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:59 localhost python3[5430]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:43:00 localhost python3[5471]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1764744179.615136-540-27899028639155/source _original_basename=tmphww9u_cg follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:01 localhost python3[5533]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:43:02 localhost python3[5576]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1764744181.5243871-684-153187929929528/source _original_basename=tmpne_dxfov follow=False checksum=fd315655f47fc5fc6a83eb387067284e4325b6ee backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:03 localhost python3[5604]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:43:03 localhost python3[5620]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:43:04 localhost python3[5670]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:43:05 localhost python3[5713]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744184.39659-811-164343956906202/source _original_basename=tmp_t9xfqgn follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:06 localhost python3[5745]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163e3b-3c83-e553-08c0-000000000023-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:43:07 localhost python3[5763]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-e553-08c0-000000000024-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 3 01:43:10 localhost python3[5782]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:25 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Dec 3 01:43:28 localhost python3[5800]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:44:01 localhost systemd[4176]: Starting Mark boot as successful... Dec 3 01:44:01 localhost systemd[4176]: Finished Mark boot as successful. Dec 3 01:44:28 localhost systemd-logind[759]: Session 1 logged out. Waiting for processes to exit. Dec 3 01:45:05 localhost systemd[1]: Unmounting EFI System Partition Automount... Dec 3 01:45:05 localhost systemd[1]: efi.mount: Deactivated successfully. Dec 3 01:45:05 localhost systemd[1]: Unmounted EFI System Partition Automount. Dec 3 01:45:22 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Dec 3 01:45:22 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Dec 3 01:45:22 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Dec 3 01:45:22 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Dec 3 01:45:22 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Dec 3 01:45:22 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Dec 3 01:45:22 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Dec 3 01:45:22 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Dec 3 01:45:22 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Dec 3 01:45:22 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4323] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Dec 3 01:45:22 localhost systemd-udevd[5807]: Network interface NamePolicy= disabled on kernel command line. Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4469] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4492] settings: (eth1): created default wired connection 'Wired connection 1' Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4495] device (eth1): carrier: link connected Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4497] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4500] policy: auto-activating connection 'Wired connection 1' (9bba1acd-f2e8-36f0-8059-f7d7793d690e) Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4505] device (eth1): Activation: starting connection 'Wired connection 1' (9bba1acd-f2e8-36f0-8059-f7d7793d690e) Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4505] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4508] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4511] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Dec 3 01:45:22 localhost NetworkManager[788]: [1764744322.4514] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:45:23 localhost sshd[5809]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:45:23 localhost systemd-logind[759]: New session 3 of user zuul. Dec 3 01:45:23 localhost systemd[1]: Started Session 3 of User zuul. Dec 3 01:45:23 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Dec 3 01:45:23 localhost python3[5826]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163e3b-3c83-b201-178d-000000000254-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:45:36 localhost python3[5876]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:45:36 localhost python3[5919]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764744336.2726617-282-84258005633282/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=1fe7cd6cf6020cc2a9ef27f5165068fd8c4a3960 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:45:37 localhost python3[5949]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 01:45:37 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Dec 3 01:45:37 localhost systemd[1]: Stopped Network Manager Wait Online. Dec 3 01:45:37 localhost systemd[1]: Stopping Network Manager Wait Online... Dec 3 01:45:37 localhost systemd[1]: Stopping Network Manager... Dec 3 01:45:37 localhost NetworkManager[788]: [1764744337.5595] caught SIGTERM, shutting down normally. Dec 3 01:45:37 localhost NetworkManager[788]: [1764744337.5673] dhcp4 (eth0): canceled DHCP transaction Dec 3 01:45:37 localhost NetworkManager[788]: [1764744337.5674] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:45:37 localhost NetworkManager[788]: [1764744337.5674] dhcp4 (eth0): state changed no lease Dec 3 01:45:37 localhost NetworkManager[788]: [1764744337.5678] manager: NetworkManager state is now CONNECTING Dec 3 01:45:37 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 01:45:37 localhost NetworkManager[788]: [1764744337.5793] dhcp4 (eth1): canceled DHCP transaction Dec 3 01:45:37 localhost NetworkManager[788]: [1764744337.5793] dhcp4 (eth1): state changed no lease Dec 3 01:45:37 localhost NetworkManager[788]: [1764744337.5859] exiting (success) Dec 3 01:45:37 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 01:45:37 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Dec 3 01:45:37 localhost systemd[1]: Stopped Network Manager. Dec 3 01:45:37 localhost systemd[1]: NetworkManager.service: Consumed 1.576s CPU time. Dec 3 01:45:37 localhost systemd[1]: Starting Network Manager... Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.6431] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:bedfd171-6426-49b5-a6ed-7bd01fd29528) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.6434] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Dec 3 01:45:37 localhost systemd[1]: Started Network Manager. Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.6458] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Dec 3 01:45:37 localhost systemd[1]: Starting Network Manager Wait Online... Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.6524] manager[0x55caef25a090]: monitoring kernel firmware directory '/lib/firmware'. Dec 3 01:45:37 localhost systemd[1]: Starting Hostname Service... Dec 3 01:45:37 localhost systemd[1]: Started Hostname Service. Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7331] hostname: hostname: using hostnamed Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7332] hostname: static hostname changed from (none) to "np0005543225.novalocal" Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7338] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7345] manager[0x55caef25a090]: rfkill: Wi-Fi hardware radio set enabled Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7345] manager[0x55caef25a090]: rfkill: WWAN hardware radio set enabled Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7385] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7386] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7386] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7387] manager: Networking is enabled by state file Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7395] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7396] settings: Loaded settings plugin: keyfile (internal) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7443] dhcp: init: Using DHCP client 'internal' Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7448] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7457] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7465] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7479] device (lo): Activation: starting connection 'lo' (cbd96401-3c72-4776-ae2e-84e23eed5754) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7489] device (eth0): carrier: link connected Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7496] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7504] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7505] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7515] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7526] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7536] device (eth1): carrier: link connected Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7543] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7551] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (9bba1acd-f2e8-36f0-8059-f7d7793d690e) (indicated) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7553] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7560] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7572] device (eth1): Activation: starting connection 'Wired connection 1' (9bba1acd-f2e8-36f0-8059-f7d7793d690e) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7601] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7609] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7613] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7617] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7624] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7627] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7632] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7677] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7685] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7690] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7701] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7706] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7726] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7736] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7743] device (lo): Activation: successful, device activated. Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7753] dhcp4 (eth0): state changed new lease, address=38.102.83.198 Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7761] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7890] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7934] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7937] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7943] manager: NetworkManager state is now CONNECTED_SITE Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7948] device (eth0): Activation: successful, device activated. Dec 3 01:45:37 localhost NetworkManager[5961]: [1764744337.7955] manager: NetworkManager state is now CONNECTED_GLOBAL Dec 3 01:45:37 localhost python3[6017]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163e3b-3c83-b201-178d-0000000000ff-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:45:47 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 01:46:07 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 01:46:22 localhost NetworkManager[5961]: [1764744382.7359] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:22 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 01:46:22 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 01:46:22 localhost NetworkManager[5961]: [1764744382.7583] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:22 localhost NetworkManager[5961]: [1764744382.7587] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:22 localhost NetworkManager[5961]: [1764744382.7598] device (eth1): Activation: successful, device activated. Dec 3 01:46:22 localhost NetworkManager[5961]: [1764744382.7609] manager: startup complete Dec 3 01:46:22 localhost systemd[1]: Finished Network Manager Wait Online. Dec 3 01:46:32 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 01:46:38 localhost systemd[1]: session-3.scope: Deactivated successfully. Dec 3 01:46:38 localhost systemd[1]: session-3.scope: Consumed 1.498s CPU time. Dec 3 01:46:38 localhost systemd-logind[759]: Session 3 logged out. Waiting for processes to exit. Dec 3 01:46:38 localhost systemd-logind[759]: Removed session 3. Dec 3 01:47:01 localhost systemd[4176]: Created slice User Background Tasks Slice. Dec 3 01:47:01 localhost systemd[4176]: Starting Cleanup of User's Temporary Files and Directories... Dec 3 01:47:01 localhost systemd[4176]: Finished Cleanup of User's Temporary Files and Directories. Dec 3 01:49:02 localhost sshd[6051]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:49:02 localhost systemd-logind[759]: New session 4 of user zuul. Dec 3 01:49:02 localhost systemd[1]: Started Session 4 of User zuul. Dec 3 01:49:02 localhost python3[6102]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:49:03 localhost python3[6145]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744542.3599217-628-84289219899179/source _original_basename=tmp70jvn48a follow=False checksum=d2d04de4e9682d62b2573337e7b0c42a9a07ab3d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:49:11 localhost systemd[1]: session-4.scope: Deactivated successfully. Dec 3 01:49:11 localhost systemd-logind[759]: Session 4 logged out. Waiting for processes to exit. Dec 3 01:49:11 localhost systemd-logind[759]: Removed session 4. Dec 3 01:51:25 localhost sshd[6160]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:27 localhost sshd[6162]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:29 localhost sshd[6164]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:31 localhost sshd[6166]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:32 localhost sshd[6168]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:34 localhost sshd[6170]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:35 localhost sshd[6172]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:37 localhost sshd[6174]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:39 localhost sshd[6176]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:41 localhost sshd[6178]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:42 localhost sshd[6181]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:44 localhost sshd[6183]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:46 localhost sshd[6185]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:48 localhost sshd[6187]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:49 localhost sshd[6189]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:51 localhost sshd[6191]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:53 localhost sshd[6193]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:55 localhost sshd[6195]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:57 localhost sshd[6197]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:51:59 localhost sshd[6199]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:01 localhost sshd[6202]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:03 localhost sshd[6204]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:04 localhost sshd[6206]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:06 localhost sshd[6208]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:08 localhost sshd[6210]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:09 localhost sshd[6212]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:11 localhost sshd[6214]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:13 localhost sshd[6216]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:15 localhost sshd[6218]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:17 localhost sshd[6220]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:19 localhost sshd[6222]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:21 localhost sshd[6224]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:52:22 localhost sshd[6226]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:56:01 localhost systemd[1]: Starting Cleanup of Temporary Directories... Dec 3 01:56:01 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Dec 3 01:56:01 localhost systemd[1]: Finished Cleanup of Temporary Directories. Dec 3 01:56:01 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Dec 3 01:56:18 localhost sshd[6233]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:56:19 localhost systemd-logind[759]: New session 5 of user zuul. Dec 3 01:56:19 localhost systemd[1]: Started Session 5 of User zuul. Dec 3 01:56:19 localhost python3[6252]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-ef11-07b0-000000001d0c-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:30 localhost python3[6272]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:30 localhost python3[6288]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:30 localhost python3[6304]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:31 localhost python3[6320]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:32 localhost python3[6336]: ansible-ansible.builtin.file Invoked with path=/etc/systemd/system.conf.d state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:33 localhost python3[6384]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system.conf.d/override.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:56:33 localhost python3[6427]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system.conf.d/override.conf mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744993.0214276-601-102596703685803/source _original_basename=tmp8jjhfh_k follow=False checksum=a05098bd3d2321238ea1169d0e6f135b35b392d4 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:35 localhost python3[6457]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Dec 3 01:56:35 localhost systemd[1]: Reloading. Dec 3 01:56:35 localhost systemd-rc-local-generator[6476]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 01:56:35 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 01:56:37 localhost python3[6503]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Dec 3 01:56:37 localhost python3[6519]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:38 localhost python3[6537]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:38 localhost python3[6555]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:38 localhost python3[6573]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:40 localhost python3[6590]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-ef11-07b0-000000001d13-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:51 localhost python3[6610]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 01:56:54 localhost systemd-logind[759]: Session 5 logged out. Waiting for processes to exit. Dec 3 01:56:54 localhost systemd[1]: session-5.scope: Deactivated successfully. Dec 3 01:56:54 localhost systemd[1]: session-5.scope: Consumed 4.062s CPU time. Dec 3 01:56:54 localhost systemd-logind[759]: Removed session 5. Dec 3 01:58:10 localhost sshd[6616]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:58:10 localhost systemd-logind[759]: New session 6 of user zuul. Dec 3 01:58:10 localhost systemd[1]: Started Session 6 of User zuul. Dec 3 01:58:11 localhost systemd[1]: Starting RHSM dbus service... Dec 3 01:58:11 localhost systemd[1]: Started RHSM dbus service. Dec 3 01:58:11 localhost rhsm-service[6640]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:11 localhost rhsm-service[6640]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:11 localhost rhsm-service[6640]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:11 localhost rhsm-service[6640]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:16 localhost rhsm-service[6640]: INFO [subscription_manager.managerlib:90] Consumer created: np0005543225.novalocal (b5a7ebaa-1284-424e-a0bf-3870d2bab3b3) Dec 3 01:58:16 localhost subscription-manager[6640]: Registered system with identity: b5a7ebaa-1284-424e-a0bf-3870d2bab3b3 Dec 3 01:58:16 localhost rhsm-service[6640]: INFO [subscription_manager.entcertlib:131] certs updated: Dec 3 01:58:16 localhost rhsm-service[6640]: Total updates: 1 Dec 3 01:58:16 localhost rhsm-service[6640]: Found (local) serial# [] Dec 3 01:58:16 localhost rhsm-service[6640]: Expected (UEP) serial# [5096890590158739310] Dec 3 01:58:16 localhost rhsm-service[6640]: Added (new) Dec 3 01:58:16 localhost rhsm-service[6640]: [sn:5096890590158739310 ( Content Access,) @ /etc/pki/entitlement/5096890590158739310.pem] Dec 3 01:58:16 localhost rhsm-service[6640]: Deleted (rogue): Dec 3 01:58:16 localhost rhsm-service[6640]: Dec 3 01:58:16 localhost subscription-manager[6640]: Added subscription for 'Content Access' contract 'None' Dec 3 01:58:16 localhost subscription-manager[6640]: Added subscription for product ' Content Access' Dec 3 01:58:17 localhost rhsm-service[6640]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:17 localhost rhsm-service[6640]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:17 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:18 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:18 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:18 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:18 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:22 localhost python3[6731]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163e3b-3c83-ef61-b9c4-00000000000d-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:58:24 localhost python3[6750]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 01:58:55 localhost setsebool[6825]: The virt_use_nfs policy boolean was changed to 1 by root Dec 3 01:58:55 localhost setsebool[6825]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Dec 3 01:59:03 localhost kernel: SELinux: Converting 407 SID table entries... Dec 3 01:59:03 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 01:59:03 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 01:59:03 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 01:59:16 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=3 res=1 Dec 3 01:59:16 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 01:59:16 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 01:59:16 localhost systemd[1]: Reloading. Dec 3 01:59:16 localhost systemd-rc-local-generator[7735]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 01:59:16 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 01:59:16 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 01:59:18 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:59:25 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 01:59:25 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 01:59:25 localhost systemd[1]: man-db-cache-update.service: Consumed 10.558s CPU time. Dec 3 01:59:25 localhost systemd[1]: run-rb92e34efcce94aacbe34ecf52fce3337.service: Deactivated successfully. Dec 3 02:00:13 localhost podman[18419]: 2025-12-03 07:00:13.542881523 +0000 UTC m=+0.104379489 system refresh Dec 3 02:00:14 localhost systemd[4176]: Starting D-Bus User Message Bus... Dec 3 02:00:14 localhost dbus-broker-launch[18476]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Dec 3 02:00:14 localhost dbus-broker-launch[18476]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Dec 3 02:00:14 localhost systemd[4176]: Started D-Bus User Message Bus. Dec 3 02:00:14 localhost journal[18476]: Ready Dec 3 02:00:14 localhost systemd[4176]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Dec 3 02:00:14 localhost systemd[4176]: Created slice Slice /user. Dec 3 02:00:14 localhost systemd[4176]: podman-18460.scope: unit configures an IP firewall, but not running as root. Dec 3 02:00:14 localhost systemd[4176]: (This warning is only shown for the first unit using IP firewalling.) Dec 3 02:00:14 localhost systemd[4176]: Started podman-18460.scope. Dec 3 02:00:14 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 02:00:14 localhost systemd[4176]: Started podman-pause-c55b88ba.scope. Dec 3 02:00:17 localhost systemd[1]: session-6.scope: Deactivated successfully. Dec 3 02:00:17 localhost systemd[1]: session-6.scope: Consumed 50.285s CPU time. Dec 3 02:00:17 localhost systemd-logind[759]: Session 6 logged out. Waiting for processes to exit. Dec 3 02:00:17 localhost systemd-logind[759]: Removed session 6. Dec 3 02:00:31 localhost sshd[18483]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:31 localhost sshd[18482]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:31 localhost sshd[18481]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:31 localhost sshd[18484]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:31 localhost sshd[18480]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:38 localhost sshd[18490]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:38 localhost systemd-logind[759]: New session 7 of user zuul. Dec 3 02:00:38 localhost systemd[1]: Started Session 7 of User zuul. Dec 3 02:00:38 localhost python3[18507]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPQSwfFxvY+jBWbbYO4QiRXKuP8EaSYDx+BvbwNKUrEzFdLhHdowabjwGeAW/HzM13HZM4Kh3Din31Kyrzy2isM= zuul@np0005543222.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:00:39 localhost python3[18523]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPQSwfFxvY+jBWbbYO4QiRXKuP8EaSYDx+BvbwNKUrEzFdLhHdowabjwGeAW/HzM13HZM4Kh3Din31Kyrzy2isM= zuul@np0005543222.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:00:41 localhost systemd[1]: session-7.scope: Deactivated successfully. Dec 3 02:00:41 localhost systemd-logind[759]: Session 7 logged out. Waiting for processes to exit. Dec 3 02:00:41 localhost systemd-logind[759]: Removed session 7. Dec 3 02:02:09 localhost sshd[18540]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:02:09 localhost systemd-logind[759]: New session 8 of user zuul. Dec 3 02:02:09 localhost systemd[1]: Started Session 8 of User zuul. Dec 3 02:02:09 localhost python3[18559]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa 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 zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:02:11 localhost python3[18575]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005543225.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Dec 3 02:02:12 localhost python3[18625]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:12 localhost python3[18668]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764745331.8916025-90-125436138499308/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa follow=False checksum=9b3b0b96dc6fc77189c35f68399e9ed1b064c3ee backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:14 localhost python3[18730]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:14 localhost python3[18773]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764745333.7976954-179-135574875952532/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa.pub follow=False checksum=46a348b05953740ee1ba05abb28a06a2e244afc4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:16 localhost python3[18803]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:17 localhost python3[18849]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:17 localhost python3[18865]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmpaa1ix4m7 recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:19 localhost python3[18925]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:19 localhost python3[18941]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmplxwauean recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:20 localhost python3[19001]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:21 localhost python3[19017]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmpeeiknj8v recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:22 localhost systemd[1]: session-8.scope: Deactivated successfully. Dec 3 02:02:22 localhost systemd[1]: session-8.scope: Consumed 3.769s CPU time. Dec 3 02:02:22 localhost systemd-logind[759]: Session 8 logged out. Waiting for processes to exit. Dec 3 02:02:22 localhost systemd-logind[759]: Removed session 8. Dec 3 02:04:39 localhost sshd[19035]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:04:39 localhost systemd-logind[759]: New session 9 of user zuul. Dec 3 02:04:39 localhost systemd[1]: Started Session 9 of User zuul. Dec 3 02:04:40 localhost python3[19081]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:07:01 localhost systemd[1]: Starting dnf makecache... Dec 3 02:07:01 localhost dnf[19085]: Updating Subscription Management repositories. Dec 3 02:07:03 localhost dnf[19085]: Failed determining last makecache time. Dec 3 02:07:03 localhost dnf[19085]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 49 kB/s | 4.5 kB 00:00 Dec 3 02:07:03 localhost dnf[19085]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 54 kB/s | 4.5 kB 00:00 Dec 3 02:07:03 localhost dnf[19085]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 54 kB/s | 4.1 kB 00:00 Dec 3 02:07:03 localhost dnf[19085]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 52 kB/s | 4.1 kB 00:00 Dec 3 02:07:04 localhost dnf[19085]: Metadata cache created. Dec 3 02:07:04 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Dec 3 02:07:04 localhost systemd[1]: Finished dnf makecache. Dec 3 02:07:04 localhost systemd[1]: dnf-makecache.service: Consumed 2.587s CPU time. Dec 3 02:09:39 localhost systemd[1]: session-9.scope: Deactivated successfully. Dec 3 02:09:39 localhost systemd-logind[759]: Session 9 logged out. Waiting for processes to exit. Dec 3 02:09:39 localhost systemd-logind[759]: Removed session 9. Dec 3 02:16:04 localhost sshd[19094]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:16:04 localhost systemd-logind[759]: New session 10 of user zuul. Dec 3 02:16:04 localhost systemd[1]: Started Session 10 of User zuul. Dec 3 02:16:05 localhost python3[19111]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000000c-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:16:16 localhost python3[19132]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000000d-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:16:31 localhost python3[19151]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Dec 3 02:16:34 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:29 localhost python3[19308]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Dec 3 02:17:32 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:32 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:40 localhost python3[19509]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Dec 3 02:17:43 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:43 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:48 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:12 localhost python3[19844]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Dec 3 02:18:15 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:15 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:20 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:43 localhost python3[20179]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Dec 3 02:18:46 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:46 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:52 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:52 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:19:16 localhost python3[20517]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000013-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:19:32 localhost python3[20537]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:19:51 localhost kernel: SELinux: Converting 490 SID table entries... Dec 3 02:19:51 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:19:51 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:19:51 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:19:52 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=4 res=1 Dec 3 02:19:52 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Dec 3 02:19:55 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:19:55 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:19:55 localhost systemd[1]: Reloading. Dec 3 02:19:55 localhost systemd-sysv-generator[21194]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:19:55 localhost systemd-rc-local-generator[21190]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:19:55 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:19:56 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:19:56 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:19:56 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:19:56 localhost systemd[1]: run-rbe83706f4f6b43cea0385fb1184b6952.service: Deactivated successfully. Dec 3 02:19:57 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:19:57 localhost rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:20:26 localhost python3[21782]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000015-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:21:07 localhost python3[21802]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:21:08 localhost python3[21850]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:21:09 localhost python3[21893]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764746468.3701391-286-48903991446933/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=4997906c68798c344e568ee48e178d8dbd720a7a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:21:10 localhost python3[21923]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:10 localhost systemd-journald[617]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 89.2 (297 of 333 items), suggesting rotation. Dec 3 02:21:10 localhost systemd-journald[617]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 02:21:10 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:21:10 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:21:11 localhost python3[21944]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:11 localhost python3[21964]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:11 localhost python3[21984]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:11 localhost python3[22004]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:15 localhost python3[22024]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:21:15 localhost systemd[1]: Starting LSB: Bring up/down networking... Dec 3 02:21:15 localhost network[22027]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Dec 3 02:21:15 localhost network[22038]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Dec 3 02:21:15 localhost network[22027]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:15 localhost network[22039]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:15 localhost network[22027]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Dec 3 02:21:15 localhost network[22040]: It is advised to switch to 'NetworkManager' instead for network management. Dec 3 02:21:15 localhost NetworkManager[5961]: [1764746475.3554] audit: op="connections-reload" pid=22068 uid=0 result="success" Dec 3 02:21:15 localhost network[22027]: Bringing up loopback interface: [ OK ] Dec 3 02:21:15 localhost NetworkManager[5961]: [1764746475.5258] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=22156 uid=0 result="success" Dec 3 02:21:15 localhost network[22027]: Bringing up interface eth0: [ OK ] Dec 3 02:21:15 localhost systemd[1]: Started LSB: Bring up/down networking. Dec 3 02:21:15 localhost python3[22197]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch Database Unit... Dec 3 02:21:16 localhost chown[22201]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Dec 3 02:21:16 localhost ovs-ctl[22206]: /etc/openvswitch/conf.db does not exist ... (warning). Dec 3 02:21:16 localhost ovs-ctl[22206]: Creating empty database /etc/openvswitch/conf.db [ OK ] Dec 3 02:21:16 localhost ovs-ctl[22206]: Starting ovsdb-server [ OK ] Dec 3 02:21:16 localhost ovs-vsctl[22255]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Dec 3 02:21:16 localhost ovs-vsctl[22275]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.6-141.el9fdp "external-ids:system-id=\"688234d2-03ca-424e-bdc4-2c4b52926c45\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Dec 3 02:21:16 localhost ovs-ctl[22206]: Configuring Open vSwitch system IDs [ OK ] Dec 3 02:21:16 localhost ovs-ctl[22206]: Enabling remote OVSDB managers [ OK ] Dec 3 02:21:16 localhost ovs-vsctl[22281]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005543225.novalocal Dec 3 02:21:16 localhost systemd[1]: Started Open vSwitch Database Unit. Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Dec 3 02:21:16 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Dec 3 02:21:16 localhost kernel: openvswitch: Open vSwitch switching datapath Dec 3 02:21:16 localhost ovs-ctl[22325]: Inserting openvswitch module [ OK ] Dec 3 02:21:16 localhost ovs-ctl[22294]: Starting ovs-vswitchd [ OK ] Dec 3 02:21:16 localhost ovs-ctl[22294]: Enabling remote OVSDB managers [ OK ] Dec 3 02:21:16 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Dec 3 02:21:16 localhost ovs-vsctl[22343]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005543225.novalocal Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch... Dec 3 02:21:16 localhost systemd[1]: Finished Open vSwitch. Dec 3 02:21:21 localhost python3[22361]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000001a-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.1083] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22519 uid=0 result="success" Dec 3 02:21:22 localhost ifup[22520]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:22 localhost ifup[22521]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:22 localhost ifup[22522]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.1409] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22528 uid=0 result="success" Dec 3 02:21:22 localhost ovs-vsctl[22530]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:bd:b5:97 -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Dec 3 02:21:22 localhost kernel: device ovs-system entered promiscuous mode Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.1701] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Dec 3 02:21:22 localhost kernel: Timeout policy base is empty Dec 3 02:21:22 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Dec 3 02:21:22 localhost systemd-udevd[22532]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:22 localhost kernel: device br-ex entered promiscuous mode Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.2148] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.2406] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22557 uid=0 result="success" Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.2620] device (br-ex): carrier: link connected Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.3209] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22586 uid=0 result="success" Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.3688] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22601 uid=0 result="success" Dec 3 02:21:25 localhost NET[22626]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4539] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4673] dhcp4 (eth1): canceled DHCP transaction Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4674] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4674] dhcp4 (eth1): state changed no lease Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4736] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22635 uid=0 result="success" Dec 3 02:21:25 localhost ifup[22636]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:25 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 02:21:25 localhost ifup[22637]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:25 localhost ifup[22639]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:25 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.5153] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22653 uid=0 result="success" Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.5629] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22663 uid=0 result="success" Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.5695] device (eth1): carrier: link connected Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.5932] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22672 uid=0 result="success" Dec 3 02:21:25 localhost ipv6_wait_tentative[22684]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Dec 3 02:21:26 localhost ipv6_wait_tentative[22689]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.6701] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22699 uid=0 result="success" Dec 3 02:21:27 localhost ovs-vsctl[22714]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Dec 3 02:21:27 localhost kernel: device eth1 entered promiscuous mode Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.7727] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22721 uid=0 result="success" Dec 3 02:21:27 localhost ifup[22722]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:27 localhost ifup[22723]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:27 localhost ifup[22724]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.8032] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22730 uid=0 result="success" Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.8524] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22740 uid=0 result="success" Dec 3 02:21:27 localhost ifup[22741]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:27 localhost ifup[22742]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:27 localhost ifup[22743]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.8867] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22749 uid=0 result="success" Dec 3 02:21:27 localhost ovs-vsctl[22752]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Dec 3 02:21:27 localhost kernel: device vlan22 entered promiscuous mode Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.9325] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Dec 3 02:21:27 localhost systemd-udevd[22754]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.9612] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22763 uid=0 result="success" Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.9866] device (vlan22): carrier: link connected Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.0452] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22792 uid=0 result="success" Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.0991] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22807 uid=0 result="success" Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.1561] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22828 uid=0 result="success" Dec 3 02:21:31 localhost ifup[22829]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:31 localhost ifup[22830]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:31 localhost ifup[22831]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.1823] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22837 uid=0 result="success" Dec 3 02:21:31 localhost ovs-vsctl[22840]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Dec 3 02:21:31 localhost kernel: device vlan23 entered promiscuous mode Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.2237] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Dec 3 02:21:31 localhost systemd-udevd[22843]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.2498] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22852 uid=0 result="success" Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.2718] device (vlan23): carrier: link connected Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.3227] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22882 uid=0 result="success" Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.3705] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22897 uid=0 result="success" Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.4298] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22918 uid=0 result="success" Dec 3 02:21:34 localhost ifup[22919]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:34 localhost ifup[22920]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:34 localhost ifup[22921]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.4637] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22927 uid=0 result="success" Dec 3 02:21:34 localhost ovs-vsctl[22930]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Dec 3 02:21:34 localhost kernel: device vlan44 entered promiscuous mode Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.5049] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Dec 3 02:21:34 localhost systemd-udevd[22932]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.5325] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22942 uid=0 result="success" Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.5551] device (vlan44): carrier: link connected Dec 3 02:21:35 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.6143] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22972 uid=0 result="success" Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.6581] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22987 uid=0 result="success" Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.7172] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23008 uid=0 result="success" Dec 3 02:21:37 localhost ifup[23009]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:37 localhost ifup[23010]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:37 localhost ifup[23011]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.7481] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23017 uid=0 result="success" Dec 3 02:21:37 localhost ovs-vsctl[23020]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Dec 3 02:21:37 localhost kernel: device vlan20 entered promiscuous mode Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.7764] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Dec 3 02:21:37 localhost systemd-udevd[23023]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.7980] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23032 uid=0 result="success" Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.8182] device (vlan20): carrier: link connected Dec 3 02:21:40 localhost NetworkManager[5961]: [1764746500.8745] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23062 uid=0 result="success" Dec 3 02:21:40 localhost NetworkManager[5961]: [1764746500.9255] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23077 uid=0 result="success" Dec 3 02:21:40 localhost NetworkManager[5961]: [1764746500.9939] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23098 uid=0 result="success" Dec 3 02:21:40 localhost ifup[23099]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:41 localhost ifup[23100]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:41 localhost ifup[23101]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:41 localhost NetworkManager[5961]: [1764746501.0294] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23107 uid=0 result="success" Dec 3 02:21:41 localhost ovs-vsctl[23110]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Dec 3 02:21:41 localhost kernel: device vlan21 entered promiscuous mode Dec 3 02:21:41 localhost NetworkManager[5961]: [1764746501.0758] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Dec 3 02:21:41 localhost systemd-udevd[23113]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:41 localhost NetworkManager[5961]: [1764746501.1006] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23122 uid=0 result="success" Dec 3 02:21:41 localhost NetworkManager[5961]: [1764746501.1240] device (vlan21): carrier: link connected Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.1813] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23152 uid=0 result="success" Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.2319] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23167 uid=0 result="success" Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.2949] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23188 uid=0 result="success" Dec 3 02:21:44 localhost ifup[23189]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:44 localhost ifup[23190]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:44 localhost ifup[23191]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.3307] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23197 uid=0 result="success" Dec 3 02:21:44 localhost ovs-vsctl[23200]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.3964] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23207 uid=0 result="success" Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.4579] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23234 uid=0 result="success" Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.5058] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23249 uid=0 result="success" Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.5685] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23270 uid=0 result="success" Dec 3 02:21:45 localhost ifup[23271]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:45 localhost ifup[23272]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:45 localhost ifup[23273]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.6098] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23279 uid=0 result="success" Dec 3 02:21:45 localhost ovs-vsctl[23282]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.6566] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23289 uid=0 result="success" Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.7107] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23317 uid=0 result="success" Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.7575] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23332 uid=0 result="success" Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.8165] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23353 uid=0 result="success" Dec 3 02:21:46 localhost ifup[23354]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:46 localhost ifup[23355]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:46 localhost ifup[23356]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.8480] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23362 uid=0 result="success" Dec 3 02:21:46 localhost ovs-vsctl[23365]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.9061] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23372 uid=0 result="success" Dec 3 02:21:47 localhost NetworkManager[5961]: [1764746507.9674] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23400 uid=0 result="success" Dec 3 02:21:48 localhost NetworkManager[5961]: [1764746508.0162] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23415 uid=0 result="success" Dec 3 02:21:48 localhost NetworkManager[5961]: [1764746508.0808] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23436 uid=0 result="success" Dec 3 02:21:48 localhost ifup[23437]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:48 localhost ifup[23438]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:48 localhost ifup[23439]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:48 localhost NetworkManager[5961]: [1764746508.1147] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23445 uid=0 result="success" Dec 3 02:21:48 localhost ovs-vsctl[23448]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Dec 3 02:21:48 localhost NetworkManager[5961]: [1764746508.1926] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23455 uid=0 result="success" Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.2564] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23483 uid=0 result="success" Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.3044] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23498 uid=0 result="success" Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.3603] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23519 uid=0 result="success" Dec 3 02:21:49 localhost ifup[23520]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:49 localhost ifup[23521]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:49 localhost ifup[23522]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.3886] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23528 uid=0 result="success" Dec 3 02:21:49 localhost ovs-vsctl[23531]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.4411] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23538 uid=0 result="success" Dec 3 02:21:50 localhost NetworkManager[5961]: [1764746510.5068] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23566 uid=0 result="success" Dec 3 02:21:50 localhost NetworkManager[5961]: [1764746510.5603] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23581 uid=0 result="success" Dec 3 02:22:50 localhost systemd[1]: session-10.scope: Deactivated successfully. Dec 3 02:22:50 localhost systemd[1]: session-10.scope: Consumed 1min 43.113s CPU time. Dec 3 02:22:50 localhost systemd-logind[759]: Session 10 logged out. Waiting for processes to exit. Dec 3 02:22:50 localhost systemd-logind[759]: Removed session 10. Dec 3 02:22:52 localhost sshd[23600]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:22:52 localhost systemd-logind[759]: New session 11 of user zuul. Dec 3 02:22:52 localhost systemd[1]: Started Session 11 of User zuul. Dec 3 02:22:52 localhost python3[23617]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000001b-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:23:10 localhost python3[23636]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:10 localhost python3[23652]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:11 localhost python3[23666]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:12 localhost python3[23682]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDGubqW6Tr0tDqoZvUu/bxJsqy4cocS8W6FV4CM95kfJlirsolfU35ZLVxzkDyUnHaRj2bs6Ygy8qJxfLK0mSzgYLtTd3ZvC6VayZMbDuT44khGCkPQrlRcQBmhHVHeaT4gZw5z/jjNJPjpw/QLpY/BbAOUZY6OsuF+LbyP0/EF2vOepqRxTHXLDMhjEgeQQ1hwWT/s0dG6PmkNVutgDCjhsFXEX4pQsxcGYyq+YASQWGHxr5xcLOcSHw/57QWvJvKuJjhGGFRCpiLNVGKh3rnCNKcaan4h/onUmg6Syw7OLF0gddKoui7m3CkNkHdvoYYmyDmGW1pEhwIEzDEZc/UcPSWS4bSIuNBL6BJ2S7+x4Pkh5iOi9ZpfrC0qnNO8eUGCappY/M520m1IOZMjIfcIsYzm+U+FBgN+DPWPeaGYIbC/E29whTF3mIWWUNIX4tLNK1+3VqJFSqSBEJDiX3IkfOK1tkDxZuYgcs8DzSidhiqgLjUhH8/tJW+Od8Qzp9U= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:12 localhost sshd[23683]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:23:13 localhost python3[23698]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Dec 3 02:23:13 localhost python3[23713]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005543225.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000022-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:23:24 localhost python3[23733]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000023-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:23:24 localhost systemd[1]: Starting Hostname Service... Dec 3 02:23:24 localhost systemd[1]: Started Hostname Service. Dec 3 02:23:24 localhost systemd-hostnamed[23737]: Hostname set to (static) Dec 3 02:23:24 localhost NetworkManager[5961]: [1764746604.6768] hostname: static hostname changed from "np0005543225.novalocal" to "np0005543225.ooo.test" Dec 3 02:23:24 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 02:23:24 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 02:23:34 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 02:23:35 localhost systemd[1]: session-11.scope: Deactivated successfully. Dec 3 02:23:35 localhost systemd[1]: session-11.scope: Consumed 2.060s CPU time. Dec 3 02:23:35 localhost systemd-logind[759]: Session 11 logged out. Waiting for processes to exit. Dec 3 02:23:35 localhost systemd-logind[759]: Removed session 11. Dec 3 02:23:36 localhost sshd[23750]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:23:36 localhost systemd-logind[759]: New session 12 of user zuul. Dec 3 02:23:36 localhost systemd[1]: Started Session 12 of User zuul. Dec 3 02:23:37 localhost python3[23767]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Dec 3 02:23:40 localhost systemd[1]: session-12.scope: Deactivated successfully. Dec 3 02:23:40 localhost systemd-logind[759]: Session 12 logged out. Waiting for processes to exit. Dec 3 02:23:40 localhost systemd-logind[759]: Removed session 12. Dec 3 02:23:45 localhost sshd[23771]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:23:46 localhost systemd-logind[759]: New session 13 of user zuul. Dec 3 02:23:46 localhost systemd[1]: Started Session 13 of User zuul. Dec 3 02:23:46 localhost python3[23790]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:23:54 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Dec 3 02:23:54 localhost dbus-broker-launch[18476]: Noticed file-system modification, trigger reload. Dec 3 02:23:54 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Dec 3 02:23:54 localhost dbus-broker-launch[18476]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Dec 3 02:23:54 localhost dbus-broker-launch[18476]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Dec 3 02:23:54 localhost dbus-broker-launch[18476]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Dec 3 02:23:54 localhost systemd[1]: Reloading. Dec 3 02:23:54 localhost systemd-rc-local-generator[23888]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:23:54 localhost systemd-sysv-generator[23894]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:23:54 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:23:54 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 02:23:54 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Dec 3 02:24:03 localhost kernel: SELinux: Converting 538 SID table entries... Dec 3 02:24:03 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:24:03 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:24:03 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:24:03 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:24:03 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:24:03 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:24:03 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:24:04 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=5 res=1 Dec 3 02:24:04 localhost systemd[1]: Stopping OpenSSH server daemon... Dec 3 02:24:04 localhost systemd[1]: sshd.service: Deactivated successfully. Dec 3 02:24:04 localhost systemd[1]: Stopped OpenSSH server daemon. Dec 3 02:24:04 localhost systemd[1]: sshd.service: Consumed 2.286s CPU time. Dec 3 02:24:04 localhost systemd[1]: Stopped target sshd-keygen.target. Dec 3 02:24:04 localhost systemd[1]: Stopping sshd-keygen.target... Dec 3 02:24:04 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 02:24:04 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 02:24:04 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 02:24:04 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 02:24:04 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 02:24:04 localhost sshd[23931]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:24:04 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 02:24:05 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:24:05 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:24:05 localhost systemd[1]: Reloading. Dec 3 02:24:05 localhost systemd-sysv-generator[24494]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:24:05 localhost systemd-rc-local-generator[24487]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:24:05 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:24:05 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:24:05 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:24:07 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:24:07 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:24:07 localhost systemd[1]: man-db-cache-update.service: Consumed 1.750s CPU time. Dec 3 02:24:07 localhost systemd[1]: run-rd94ae89edb1d4c939aec38e4e6549014.service: Deactivated successfully. Dec 3 02:24:07 localhost systemd[1]: run-raba5ed83c0954515a95d6dfeda48c0d6.service: Deactivated successfully. Dec 3 02:25:07 localhost systemd[1]: session-13.scope: Deactivated successfully. Dec 3 02:25:07 localhost systemd[1]: session-13.scope: Consumed 17.599s CPU time. Dec 3 02:25:07 localhost systemd-logind[759]: Session 13 logged out. Waiting for processes to exit. Dec 3 02:25:07 localhost systemd-logind[759]: Removed session 13. Dec 3 02:26:13 localhost sshd[25895]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:26:13 localhost systemd-logind[759]: New session 14 of user zuul. Dec 3 02:26:13 localhost systemd[1]: Started Session 14 of User zuul. Dec 3 02:26:14 localhost python3[25946]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:26:14 localhost python3[25991]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764746773.918855-62-236779032809493/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:26:19 localhost python3[26021]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:26:21 localhost python3[26039]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:26:50 localhost sshd[26040]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:27:21 localhost systemd[1]: session-14.scope: Deactivated successfully. Dec 3 02:27:21 localhost systemd[1]: session-14.scope: Consumed 1.173s CPU time. Dec 3 02:27:21 localhost systemd-logind[759]: Session 14 logged out. Waiting for processes to exit. Dec 3 02:27:21 localhost systemd-logind[759]: Removed session 14. Dec 3 02:29:53 localhost sshd[26042]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:31:03 localhost sshd[26045]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:31:57 localhost sshd[26047]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:34:02 localhost sshd[26049]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:36:02 localhost sshd[26055]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:36:52 localhost sshd[26057]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:38:03 localhost sshd[26058]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:40:06 localhost sshd[26060]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:40:26 localhost sshd[26062]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:40:26 localhost sshd[26063]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:42:09 localhost sshd[26065]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:44:11 localhost sshd[26068]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:46:14 localhost sshd[26070]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:48:20 localhost sshd[26073]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:50:22 localhost sshd[26076]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:52:22 localhost sshd[26080]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:25 localhost sshd[26082]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:38 localhost sshd[26084]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:38 localhost systemd-logind[759]: New session 15 of user zuul. Dec 3 02:54:38 localhost systemd[1]: Started Session 15 of User zuul. Dec 3 02:54:38 localhost python3[26132]: ansible-ansible.legacy.ping Invoked with data=pong Dec 3 02:54:39 localhost python3[26177]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 02:54:40 localhost python3[26197]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005543225.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Dec 3 02:54:40 localhost systemd-journald[617]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Dec 3 02:54:40 localhost systemd-journald[617]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 02:54:40 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:54:40 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:54:41 localhost python3[26255]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:54:41 localhost python3[26298]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1764748480.6946065-81893-27243983002266/source _original_basename=tmpij65zxra follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:42 localhost python3[26328]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:42 localhost python3[26344]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:42 localhost python3[26360]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:43 localhost python3[26376]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa 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 zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:44 localhost python3[26390]: ansible-ping Invoked with data=pong Dec 3 02:54:55 localhost sshd[26391]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:55 localhost systemd[1]: Created slice User Slice of UID 1002. Dec 3 02:54:55 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Dec 3 02:54:55 localhost systemd-logind[759]: New session 16 of user tripleo-admin. Dec 3 02:54:55 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Dec 3 02:54:55 localhost systemd[1]: Starting User Manager for UID 1002... Dec 3 02:54:55 localhost systemd[26395]: Queued start job for default target Main User Target. Dec 3 02:54:55 localhost systemd[26395]: Created slice User Application Slice. Dec 3 02:54:55 localhost systemd[26395]: Started Mark boot as successful after the user session has run 2 minutes. Dec 3 02:54:55 localhost systemd[26395]: Started Daily Cleanup of User's Temporary Directories. Dec 3 02:54:55 localhost systemd[26395]: Reached target Paths. Dec 3 02:54:55 localhost systemd[26395]: Reached target Timers. Dec 3 02:54:55 localhost systemd[26395]: Starting D-Bus User Message Bus Socket... Dec 3 02:54:55 localhost systemd[26395]: Starting Create User's Volatile Files and Directories... Dec 3 02:54:55 localhost systemd[26395]: Listening on D-Bus User Message Bus Socket. Dec 3 02:54:55 localhost systemd[26395]: Reached target Sockets. Dec 3 02:54:55 localhost systemd[26395]: Finished Create User's Volatile Files and Directories. Dec 3 02:54:55 localhost systemd[26395]: Reached target Basic System. Dec 3 02:54:55 localhost systemd[26395]: Reached target Main User Target. Dec 3 02:54:55 localhost systemd[26395]: Startup finished in 118ms. Dec 3 02:54:55 localhost systemd[1]: Started User Manager for UID 1002. Dec 3 02:54:55 localhost systemd[1]: Started Session 16 of User tripleo-admin. Dec 3 02:54:56 localhost python3[26456]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Dec 3 02:55:00 localhost python3[26476]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Dec 3 02:55:01 localhost python3[26494]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Dec 3 02:55:02 localhost python3[26542]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.wk94_97dtmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:02 localhost python3[26572]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.wk94_97dtmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:03 localhost python3[26588]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.wk94_97dtmphosts insertbefore=BOF block=172.17.0.106 np0005543228.ooo.test np0005543228#012172.18.0.106 np0005543228.storage.ooo.test np0005543228.storage#012172.17.0.106 np0005543228.internalapi.ooo.test np0005543228.internalapi#012172.19.0.106 np0005543228.tenant.ooo.test np0005543228.tenant#012192.168.122.106 np0005543228.ctlplane.ooo.test np0005543228.ctlplane#012172.17.0.107 np0005543230.ooo.test np0005543230#012172.18.0.107 np0005543230.storage.ooo.test np0005543230.storage#012172.17.0.107 np0005543230.internalapi.ooo.test np0005543230.internalapi#012172.19.0.107 np0005543230.tenant.ooo.test np0005543230.tenant#012192.168.122.107 np0005543230.ctlplane.ooo.test np0005543230.ctlplane#012172.17.0.108 np0005543231.ooo.test np0005543231#012172.18.0.108 np0005543231.storage.ooo.test np0005543231.storage#012172.17.0.108 np0005543231.internalapi.ooo.test np0005543231.internalapi#012172.19.0.108 np0005543231.tenant.ooo.test np0005543231.tenant#012192.168.122.108 np0005543231.ctlplane.ooo.test np0005543231.ctlplane#012172.17.0.103 np0005543225.ooo.test np0005543225#012172.18.0.103 np0005543225.storage.ooo.test np0005543225.storage#012172.20.0.103 np0005543225.storagemgmt.ooo.test np0005543225.storagemgmt#012172.17.0.103 np0005543225.internalapi.ooo.test np0005543225.internalapi#012172.19.0.103 np0005543225.tenant.ooo.test np0005543225.tenant#012172.21.0.103 np0005543225.external.ooo.test np0005543225.external#012192.168.122.103 np0005543225.ctlplane.ooo.test np0005543225.ctlplane#012172.17.0.104 np0005543226.ooo.test np0005543226#012172.18.0.104 np0005543226.storage.ooo.test np0005543226.storage#012172.20.0.104 np0005543226.storagemgmt.ooo.test np0005543226.storagemgmt#012172.17.0.104 np0005543226.internalapi.ooo.test np0005543226.internalapi#012172.19.0.104 np0005543226.tenant.ooo.test np0005543226.tenant#012172.21.0.104 np0005543226.external.ooo.test np0005543226.external#012192.168.122.104 np0005543226.ctlplane.ooo.test np0005543226.ctlplane#012172.17.0.105 np0005543227.ooo.test np0005543227#012172.18.0.105 np0005543227.storage.ooo.test np0005543227.storage#012172.20.0.105 np0005543227.storagemgmt.ooo.test np0005543227.storagemgmt#012172.17.0.105 np0005543227.internalapi.ooo.test np0005543227.internalapi#012172.19.0.105 np0005543227.tenant.ooo.test np0005543227.tenant#012172.21.0.105 np0005543227.external.ooo.test np0005543227.external#012192.168.122.105 np0005543227.ctlplane.ooo.test np0005543227.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.166 overcloud.storage.ooo.test#012172.20.0.188 overcloud.storagemgmt.ooo.test#012172.17.0.147 overcloud.internalapi.ooo.test#012172.21.0.122 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:04 localhost python3[26604]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.wk94_97dtmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:55:04 localhost python3[26621]: ansible-file Invoked with path=/tmp/ansible.wk94_97dtmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:05 localhost python3[26637]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:55:07 localhost python3[26654]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:55:12 localhost python3[26673]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:55:12 localhost python3[26690]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:55:24 localhost systemd[1]: Reloading. Dec 3 02:55:24 localhost systemd-rc-local-generator[26883]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:55:24 localhost systemd-sysv-generator[26890]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:55:25 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:55:25 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Dec 3 02:55:33 localhost systemd[1]: Reloading. Dec 3 02:55:33 localhost systemd-rc-local-generator[26955]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:55:33 localhost systemd-sysv-generator[26958]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:55:33 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:55:33 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Dec 3 02:55:33 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Dec 3 02:55:33 localhost systemd[1]: Reloading. Dec 3 02:55:33 localhost systemd-sysv-generator[26998]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:55:33 localhost systemd-rc-local-generator[26994]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:55:33 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:55:33 localhost systemd[1]: Listening on LVM2 poll daemon socket. Dec 3 02:56:23 localhost kernel: SELinux: Converting 2713 SID table entries... Dec 3 02:56:23 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:56:23 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:56:23 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:56:23 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=7 res=1 Dec 3 02:56:23 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:23 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:56:23 localhost systemd[1]: Reloading. Dec 3 02:56:23 localhost systemd-rc-local-generator[27564]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:56:23 localhost systemd-sysv-generator[27568]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:56:23 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:56:24 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:56:24 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:24 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:56:24 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:56:24 localhost systemd[1]: man-db-cache-update.service: Consumed 1.040s CPU time. Dec 3 02:56:24 localhost systemd[1]: run-r31718bb13e11494194670b1b20bc22f8.service: Deactivated successfully. Dec 3 02:56:24 localhost systemd[1]: run-r9e08e44755634a378e3bb5825b86d35d.service: Deactivated successfully. Dec 3 02:56:26 localhost python3[28448]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:27 localhost python3[28587]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:56:27 localhost systemd[1]: Reloading. Dec 3 02:56:27 localhost systemd-sysv-generator[28621]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:56:27 localhost systemd-rc-local-generator[28616]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:56:27 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:56:28 localhost sshd[28626]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:56:29 localhost python3[28643]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:29 localhost python3[28659]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:30 localhost python3[28676]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Dec 3 02:56:32 localhost python3[28694]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:32 localhost python3[28712]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:32 localhost python3[28730]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:56:32 localhost systemd[1]: Reloading Network Manager... Dec 3 02:56:32 localhost NetworkManager[5961]: [1764748592.9939] audit: op="reload" arg="0" pid=28733 uid=0 result="success" Dec 3 02:56:32 localhost NetworkManager[5961]: [1764748592.9954] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Dec 3 02:56:32 localhost NetworkManager[5961]: [1764748592.9954] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Dec 3 02:56:32 localhost systemd[1]: Reloaded Network Manager. Dec 3 02:56:33 localhost python3[28749]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:33 localhost python3[28766]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:34 localhost python3[28784]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:34 localhost python3[28800]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:35 localhost python3[28816]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Dec 3 02:56:35 localhost python3[28832]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:36 localhost python3[28848]: ansible-blockinfile Invoked with path=/tmp/ansible.393lp6f9 block=[192.168.122.106]*,[np0005543228.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005543228.internalapi.ooo.test]*,[172.18.0.106]*,[np0005543228.storage.ooo.test]*,[172.19.0.106]*,[np0005543228.tenant.ooo.test]*,[np0005543228.ooo.test]*,[np0005543228]* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC9uxHxNxkjzWHP3Ir/FVxyMMEHkZ/wWVqAtBoIcIYYO5xmmwvz+GYXHDpIGJhZApYLav7ZDCABTdeux+WdntiDZNRE9XDL53mG2RhY3+UkN6uydR1ajXSDVBGeFZg3ZiDtB0CsVG4auPXHcjFxGR5UDB3Txz+yKaP5RF/n857+6sXs4WUcJOSSO5Map8PTPZ3o7Ag6ZTPRUIlx0JUgqzmB6ovdP/kEeZOnYEObXaPqyirhJOAJTJ3q/CaBJrS8es0A2OZb1PolkZ+pCILgKmQUG05PfAYSXo19i2leefSVGP4pWwAA140klxRO4jso1Z9qMN98ZRF7aBbEQl/AKnhcHE3DjnljBJvO9qE/0LdF/wiF08tvpP+iWH977d8zpSKGhWOYICTg68R/bYaMzmIsODo1zmzEGqzZIX+iju/qknLPg/SMNwBzGXthBmtMY04bb2lO6ozdda94jLzKTbuygllQC2GsdCUXaKhTzbrEqOI5pKGrnq0I8ISx3/HIAok=#012[192.168.122.107]*,[np0005543230.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005543230.internalapi.ooo.test]*,[172.18.0.107]*,[np0005543230.storage.ooo.test]*,[172.19.0.107]*,[np0005543230.tenant.ooo.test]*,[np0005543230.ooo.test]*,[np0005543230]* ssh-rsa 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#012[192.168.122.108]*,[np0005543231.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005543231.internalapi.ooo.test]*,[172.18.0.108]*,[np0005543231.storage.ooo.test]*,[172.19.0.108]*,[np0005543231.tenant.ooo.test]*,[np0005543231.ooo.test]*,[np0005543231]* ssh-rsa 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#012[192.168.122.103]*,[np0005543225.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005543225.external.ooo.test]*,[172.17.0.103]*,[np0005543225.internalapi.ooo.test]*,[172.18.0.103]*,[np0005543225.storage.ooo.test]*,[172.20.0.103]*,[np0005543225.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005543225.tenant.ooo.test]*,[np0005543225.ooo.test]*,[np0005543225]* ssh-rsa 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#012[192.168.122.104]*,[np0005543226.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005543226.external.ooo.test]*,[172.17.0.104]*,[np0005543226.internalapi.ooo.test]*,[172.18.0.104]*,[np0005543226.storage.ooo.test]*,[172.20.0.104]*,[np0005543226.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005543226.tenant.ooo.test]*,[np0005543226.ooo.test]*,[np0005543226]* ssh-rsa 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#012[192.168.122.105]*,[np0005543227.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005543227.external.ooo.test]*,[172.17.0.105]*,[np0005543227.internalapi.ooo.test]*,[172.18.0.105]*,[np0005543227.storage.ooo.test]*,[172.20.0.105]*,[np0005543227.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005543227.tenant.ooo.test]*,[np0005543227.ooo.test]*,[np0005543227]* ssh-rsa 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#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:37 localhost python3[28864]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.393lp6f9' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:37 localhost python3[28882]: ansible-file Invoked with path=/tmp/ansible.393lp6f9 state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:38 localhost python3[28898]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Dec 3 02:56:38 localhost python3[28914]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:39 localhost python3[28932]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:39 localhost python3[28951]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Dec 3 02:56:42 localhost python3[29088]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:42 localhost python3[29105]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:56:45 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Dec 3 02:56:45 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Dec 3 02:56:45 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:45 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:56:45 localhost systemd[1]: Reloading. Dec 3 02:56:45 localhost systemd-sysv-generator[29194]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:56:45 localhost systemd-rc-local-generator[29186]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:56:45 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:56:46 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:56:46 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Dec 3 02:56:46 localhost systemd[1]: tuned.service: Deactivated successfully. Dec 3 02:56:46 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Dec 3 02:56:46 localhost systemd[1]: tuned.service: Consumed 1.988s CPU time. Dec 3 02:56:46 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Dec 3 02:56:46 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:56:46 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:56:46 localhost systemd[1]: run-r69718450338c4493a6f11ca4564272f7.service: Deactivated successfully. Dec 3 02:56:47 localhost systemd[1]: Started Dynamic System Tuning Daemon. Dec 3 02:56:47 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:47 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:56:47 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:56:47 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:56:47 localhost systemd[1]: run-rff47d17bb8b74af587a58946fa509468.service: Deactivated successfully. Dec 3 02:56:48 localhost python3[29550]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:56:50 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Dec 3 02:56:50 localhost systemd[1]: tuned.service: Deactivated successfully. Dec 3 02:56:50 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Dec 3 02:56:50 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Dec 3 02:56:51 localhost systemd[1]: Started Dynamic System Tuning Daemon. Dec 3 02:56:51 localhost python3[29745]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:52 localhost python3[29762]: ansible-slurp Invoked with src=/etc/tuned/active_profile Dec 3 02:56:52 localhost python3[29778]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:53 localhost python3[29794]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:55 localhost python3[29814]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:55 localhost python3[29831]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:57 localhost python3[29847]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:01 localhost systemd[26395]: Starting Mark boot as successful... Dec 3 02:57:01 localhost systemd[26395]: Finished Mark boot as successful. Dec 3 02:57:01 localhost python3[29864]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:02 localhost python3[29912]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:02 localhost python3[29957]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748621.7826655-87373-184415516956504/source _original_basename=tmpklhfjd8h follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:03 localhost python3[29987]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:03 localhost python3[30035]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:04 localhost python3[30078]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748623.4525735-87573-197673553758896/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=0b8212f4500c40b31ba4dd459c2695d956264369 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:04 localhost python3[30140]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:05 localhost python3[30183]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748624.4176085-87797-190978031778838/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=2c29b36a1551bdd104ca7b81ba27c00dedb68297 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:05 localhost python3[30245]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:06 localhost python3[30288]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748625.3867276-87797-1926802304004/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=2093b47eb1119a802673002321e960c01a008d59 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:07 localhost python3[30350]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:07 localhost python3[30393]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748626.375609-87797-179705887271478/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=58a6ffe95d92c6d1cd6a9c438fa59ae801d53929 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:08 localhost python3[30455]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:08 localhost python3[30498]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748627.6567538-87797-141359359317243/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:08 localhost python3[30560]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:09 localhost python3[30603]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748628.639891-87797-49046904680685/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=4740bb9364094dc47a12b0385cac9202f2b1d7d7 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:10 localhost python3[30665]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:10 localhost python3[30708]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748629.8343558-87797-173389178490005/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:11 localhost python3[30770]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:11 localhost python3[30813]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748630.8035083-87797-147060308755885/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=0c921408d3f2ea7e82fbc791b96f093196f1f642 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:12 localhost python3[30875]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:12 localhost python3[30918]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748631.8004706-87797-184396670816710/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:13 localhost python3[30980]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:13 localhost python3[31023]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748632.762344-87797-13191511233269/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:14 localhost python3[31085]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:14 localhost python3[31128]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748633.7463715-87797-123069162089682/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=5a286915b07255e2f263d3ee42c52d8771889929 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:15 localhost python3[31158]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:57:15 localhost python3[31206]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:16 localhost python3[31249]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748635.6153693-89230-31115867305072/source _original_basename=tmpnb6znqiq follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:21 localhost python3[31279]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Dec 3 02:57:21 localhost python3[31340]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:26 localhost python3[31357]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:31 localhost python3[31374]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:32 localhost python3[31397]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:32 localhost python3[31420]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:33 localhost python3[31443]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:33 localhost python3[31466]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:34 localhost python3[31489]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:24 localhost python3[31512]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:24 localhost python3[31560]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:24 localhost python3[31578]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmpoejtvp8g recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:25 localhost python3[31608]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:26 localhost python3[31656]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:26 localhost python3[31674]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:27 localhost python3[31736]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:27 localhost python3[31754]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:27 localhost python3[31816]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:28 localhost python3[31834]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:28 localhost python3[31896]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:29 localhost sshd[31899]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:58:29 localhost python3[31916]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:29 localhost python3[31978]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:30 localhost python3[31996]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:30 localhost python3[32058]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:30 localhost python3[32076]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:31 localhost python3[32138]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:31 localhost python3[32156]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:32 localhost python3[32218]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:32 localhost python3[32236]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:33 localhost python3[32298]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:33 localhost python3[32316]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:33 localhost python3[32378]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:34 localhost python3[32396]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:34 localhost python3[32458]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:34 localhost python3[32476]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:35 localhost python3[32506]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:58:36 localhost python3[32554]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:36 localhost python3[32572]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmpz4vznob7 recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:39 localhost python3[32602]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:58:44 localhost python3[32619]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:58:44 localhost python3[32637]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:58:45 localhost python3[32655]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:58:46 localhost systemd[1]: Reloading. Dec 3 02:58:46 localhost systemd-sysv-generator[32684]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:58:46 localhost systemd-rc-local-generator[32681]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:58:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:58:46 localhost systemd[1]: Starting Netfilter Tables... Dec 3 02:58:46 localhost systemd[1]: Finished Netfilter Tables. Dec 3 02:58:47 localhost python3[32746]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:47 localhost python3[32789]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748726.8310034-93469-83337599662608/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:48 localhost python3[32819]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:48 localhost python3[32837]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:49 localhost python3[32886]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:49 localhost python3[32929]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748728.7342567-93862-174133121194783/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:50 localhost python3[32991]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:50 localhost python3[33034]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748729.7841225-94052-236040124781259/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:51 localhost python3[33096]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:51 localhost python3[33140]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748730.8709626-94207-224560630014185/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:52 localhost python3[33202]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:52 localhost python3[33245]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748731.908599-94334-155283630195639/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:54 localhost python3[33307]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:54 localhost python3[33350]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748732.9404461-94501-273363464336457/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:55 localhost python3[33380]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:55 localhost python3[33445]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:56 localhost python3[33462]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:56 localhost python3[33479]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:57 localhost python3[33498]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:58:57 localhost python3[33514]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Dec 3 02:58:58 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=8 res=1 Dec 3 02:58:58 localhost python3[33535]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:58:58 localhost python3[33551]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:58:59 localhost python3[33567]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:00 localhost kernel: SELinux: Converting 2717 SID table entries... Dec 3 02:59:00 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:00 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:00 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:00 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=9 res=1 Dec 3 02:59:00 localhost python3[33588]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:00 localhost python3[33604]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:01 localhost python3[33620]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:01 localhost python3[33636]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:02 localhost python3[33652]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:59:05 localhost python3[33669]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 3 02:59:05 localhost python3[33686]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 3 02:59:05 localhost kernel: loop: module loaded Dec 3 02:59:05 localhost kernel: loop0: detected capacity change from 0 to 41943040 Dec 3 02:59:06 localhost python3[33711]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Dec 3 02:59:06 localhost lvm[33715]: PV /dev/loop0 not used. Dec 3 02:59:06 localhost lvm[33717]: PV /dev/loop0 online, VG cinder-volumes is complete. Dec 3 02:59:06 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Dec 3 02:59:06 localhost lvm[33719]: 0 logical volume(s) in volume group "cinder-volumes" now active Dec 3 02:59:06 localhost systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Dec 3 02:59:06 localhost python3[33767]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:07 localhost python3[33810]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748746.648327-95192-104939118513563/source _original_basename=tmpzskqwio4 follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:07 localhost python3[33840]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Dec 3 02:59:07 localhost systemd[1]: Reloading. Dec 3 02:59:08 localhost systemd-sysv-generator[33864]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:59:08 localhost systemd-rc-local-generator[33861]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:59:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:59:08 localhost systemd[1]: Reloading. Dec 3 02:59:08 localhost systemd-rc-local-generator[33905]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:59:08 localhost systemd-sysv-generator[33910]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:59:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:59:08 localhost python3[33930]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:09 localhost python3[33946]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:09 localhost python3[33962]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:10 localhost python3[33978]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:10 localhost python3[33994]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:11 localhost python3[34010]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:11 localhost python3[34026]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:17 localhost python3[34172]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:17 localhost python3[34188]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:17 localhost python3[34204]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:18 localhost python3[34220]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:18 localhost python3[34236]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:18 localhost python3[34252]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34268]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34284]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34300]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:20 localhost python3[34348]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:20 localhost python3[34391]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748759.95049-96331-489387475413/source _original_basename=tmpsfk9qyu7 follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:21 localhost python3[34421]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:22 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:22 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:22 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:22 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=10 res=1 Dec 3 02:59:22 localhost python3[34442]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:23 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:23 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:23 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:23 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:23 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=11 res=1 Dec 3 02:59:23 localhost python3[34463]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:24 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:24 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:24 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:24 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=12 res=1 Dec 3 02:59:25 localhost python3[34484]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:25 localhost python3[34500]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:25 localhost python3[34516]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:26 localhost python3[34532]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:26 localhost python3[34548]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:59:27 localhost python3[34565]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:59:30 localhost python3[34582]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:31 localhost python3[34630]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:31 localhost python3[34673]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748771.1451995-97120-58803757650043/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:32 localhost python3[34703]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:59:32 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 3 02:59:32 localhost systemd[1]: Stopped Load Kernel Modules. Dec 3 02:59:32 localhost systemd[1]: Stopping Load Kernel Modules... Dec 3 02:59:32 localhost systemd[1]: Starting Load Kernel Modules... Dec 3 02:59:32 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 3 02:59:32 localhost kernel: Bridge firewalling registered Dec 3 02:59:32 localhost systemd-modules-load[34706]: Inserted module 'br_netfilter' Dec 3 02:59:32 localhost systemd-modules-load[34706]: Module 'msr' is built in Dec 3 02:59:32 localhost systemd[1]: Finished Load Kernel Modules. Dec 3 02:59:32 localhost python3[34757]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:33 localhost python3[34800]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748772.6178503-97240-80703971116285/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:33 localhost python3[34830]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:34 localhost python3[34848]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:34 localhost python3[34866]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:34 localhost python3[34883]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:35 localhost python3[34900]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:35 localhost python3[34917]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:35 localhost python3[34935]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:37 localhost python3[34953]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:37 localhost python3[34971]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:37 localhost python3[34989]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:38 localhost python3[35007]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:38 localhost python3[35025]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:38 localhost python3[35043]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:39 localhost python3[35060]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:39 localhost python3[35077]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:39 localhost python3[35094]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:39 localhost python3[35111]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:40 localhost python3[35129]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:59:40 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 3 02:59:40 localhost systemd[1]: Stopped Apply Kernel Variables. Dec 3 02:59:40 localhost systemd[1]: Stopping Apply Kernel Variables... Dec 3 02:59:40 localhost systemd[1]: Starting Apply Kernel Variables... Dec 3 02:59:40 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 3 02:59:40 localhost systemd[1]: Finished Apply Kernel Variables. Dec 3 02:59:40 localhost python3[35149]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:41 localhost python3[35165]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:41 localhost python3[35181]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:41 localhost python3[35197]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:42 localhost python3[35213]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:42 localhost python3[35229]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:42 localhost python3[35245]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:43 localhost python3[35261]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:43 localhost python3[35277]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:44 localhost python3[35293]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:44 localhost python3[35309]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:44 localhost python3[35325]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:45 localhost python3[35341]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:45 localhost python3[35357]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:45 localhost python3[35373]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost python3[35389]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost python3[35405]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost python3[35421]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:47 localhost python3[35437]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:47 localhost python3[35453]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:47 localhost python3[35469]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:48 localhost python3[35485]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:48 localhost python3[35501]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:48 localhost python3[35517]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Dec 3 02:59:49 localhost python3[35539]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005543225.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Dec 3 02:59:49 localhost python3[35563]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Dec 3 02:59:50 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=13 res=1 Dec 3 02:59:50 localhost python3[35584]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:51 localhost python3[35600]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:51 localhost python3[35616]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:51 localhost python3[35632]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:52 localhost python3[35680]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:52 localhost python3[35723]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748792.0291464-98996-212821831825281/source _original_basename=tmpywoym4db follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:53 localhost python3[35785]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:53 localhost python3[35828]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748792.962508-99102-171578434301861/source _original_basename=tmpdr96bgbc follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:54 localhost python3[35858]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Dec 3 02:59:54 localhost systemd[1]: Reloading. Dec 3 02:59:54 localhost systemd-sysv-generator[35891]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:59:54 localhost systemd-rc-local-generator[35886]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:59:54 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:59:54 localhost python3[35912]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:55 localhost python3[35928]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:55 localhost python3[35944]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:59:55 localhost systemd[1]: Stopping User Login Management... Dec 3 02:59:55 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Dec 3 02:59:55 localhost systemd[1]: Stopped User Login Management. Dec 3 02:59:55 localhost systemd[1]: Starting Load Kernel Module drm... Dec 3 02:59:55 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 3 02:59:55 localhost systemd[1]: Finished Load Kernel Module drm. Dec 3 02:59:55 localhost systemd[1]: Starting User Login Management... Dec 3 02:59:55 localhost systemd-logind[35952]: New seat seat0. Dec 3 02:59:55 localhost systemd-logind[35952]: Watching system buttons on /dev/input/event0 (Power Button) Dec 3 02:59:55 localhost systemd-logind[35952]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 3 02:59:55 localhost systemd[1]: Started User Login Management. Dec 3 02:59:55 localhost systemd-logind[35952]: New session 16 of user tripleo-admin. Dec 3 02:59:55 localhost systemd-logind[35952]: New session 15 of user zuul. Dec 3 02:59:56 localhost python3[35968]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:56 localhost python3[35984]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:57 localhost python3[36000]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:57 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:57 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:57 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:58 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=14 res=1 Dec 3 02:59:58 localhost python3[36021]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:58 localhost python3[36037]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:59 localhost python3[36053]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:00 localhost python3[36071]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:00:01 localhost systemd[26395]: Created slice User Background Tasks Slice. Dec 3 03:00:01 localhost systemd[26395]: Starting Cleanup of User's Temporary Files and Directories... Dec 3 03:00:01 localhost systemd[26395]: Finished Cleanup of User's Temporary Files and Directories. Dec 3 03:00:03 localhost python3[36089]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Dec 3 03:00:03 localhost python3[36150]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:04 localhost python3[36166]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:04 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:00:04 localhost python3[36226]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:05 localhost python3[36269]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748804.3850925-99707-103626940268122/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=ffcb37696c9618c08829c98fbe0ed130ec350a1a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:05 localhost python3[36331]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:06 localhost python3[36376]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748805.4721763-99779-175668375147154/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:06 localhost python3[36406]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:07 localhost python3[36422]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:07 localhost python3[36438]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:07 localhost python3[36454]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:08 localhost python3[36502]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:08 localhost python3[36545]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748808.157267-99990-106890641591390/source _original_basename=tmp8wo8d0fr follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:09 localhost python3[36575]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:09 localhost python3[36591]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:10 localhost python3[36607]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:10 localhost python3[36655]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:10 localhost python3[36698]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748810.1767764-100201-2294819815740/source _original_basename=tmpaaup_ayj follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:11 localhost python3[36728]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:11 localhost python3[36744]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:12 localhost python3[36760]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:00:20 localhost python3[36809]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:20 localhost python3[36854]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748819.9828618-100809-138718577539860/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:21 localhost python3[36885]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:00:21 localhost systemd[1]: Stopping OpenSSH server daemon... Dec 3 03:00:21 localhost systemd[1]: sshd.service: Deactivated successfully. Dec 3 03:00:21 localhost systemd[1]: sshd.service: Unit process 31899 (sshd) remains running after unit stopped. Dec 3 03:00:21 localhost systemd[1]: sshd.service: Unit process 31900 (sshd) remains running after unit stopped. Dec 3 03:00:21 localhost systemd[1]: Stopped OpenSSH server daemon. Dec 3 03:00:21 localhost systemd[1]: Stopped target sshd-keygen.target. Dec 3 03:00:21 localhost systemd[1]: Stopping sshd-keygen.target... Dec 3 03:00:21 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:00:21 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:00:21 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:00:21 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 03:00:21 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 03:00:21 localhost sshd[36889]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:21 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 03:00:21 localhost python3[36905]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:22 localhost python3[36921]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:22 localhost python3[36937]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:22 localhost python3[36953]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:23 localhost python3[36969]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:23 localhost python3[36985]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:24 localhost python3[37001]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:24 localhost python3[37017]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:25 localhost python3[37035]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:26 localhost python3[37053]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:00:29 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=152.32.217.65 DST=38.102.83.198 LEN=40 TOS=0x08 PREC=0x40 TTL=35 ID=0 DF PROTO=TCP SPT=58108 DPT=22 SEQ=3842035255 ACK=0 WINDOW=0 RES=0x00 RST URGP=0 Dec 3 03:00:29 localhost sshd[37055]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:30 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=152.32.217.65 DST=38.102.83.198 LEN=40 TOS=0x08 PREC=0x40 TTL=35 ID=0 DF PROTO=TCP SPT=58108 DPT=22 SEQ=3842035255 ACK=0 WINDOW=0 RES=0x00 RST URGP=0 Dec 3 03:00:30 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=152.32.217.65 DST=38.102.83.198 LEN=40 TOS=0x08 PREC=0x40 TTL=35 ID=0 DF PROTO=TCP SPT=58108 DPT=22 SEQ=3842035255 ACK=0 WINDOW=0 RES=0x00 RST URGP=0 Dec 3 03:00:32 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=152.32.217.65 DST=38.102.83.198 LEN=40 TOS=0x08 PREC=0x40 TTL=35 ID=0 DF PROTO=TCP SPT=58108 DPT=22 SEQ=3842035255 ACK=0 WINDOW=0 RES=0x00 RST URGP=0 Dec 3 03:00:32 localhost python3[37104]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:33 localhost python3[37149]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748832.211202-101459-88853018779707/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:33 localhost python3[37179]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:00:34 localhost python3[37197]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 03:00:34 localhost systemd[1]: Stopping NTP client/server... Dec 3 03:00:34 localhost chronyd[765]: chronyd exiting Dec 3 03:00:34 localhost systemd[1]: chronyd.service: Deactivated successfully. Dec 3 03:00:34 localhost systemd[1]: Stopped NTP client/server. Dec 3 03:00:34 localhost systemd[1]: chronyd.service: Consumed 129ms CPU time, read 1.9M from disk, written 4.0K to disk. Dec 3 03:00:34 localhost systemd[1]: Starting NTP client/server... Dec 3 03:00:34 localhost chronyd[37204]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Dec 3 03:00:34 localhost chronyd[37204]: Frequency -26.162 +/- 0.172 ppm read from /var/lib/chrony/drift Dec 3 03:00:34 localhost chronyd[37204]: Loaded seccomp filter (level 2) Dec 3 03:00:34 localhost systemd[1]: Started NTP client/server. Dec 3 03:00:34 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=152.32.217.65 DST=38.102.83.198 LEN=40 TOS=0x08 PREC=0x40 TTL=35 ID=0 DF PROTO=TCP SPT=58108 DPT=22 SEQ=3842035255 ACK=0 WINDOW=0 RES=0x00 RST URGP=0 Dec 3 03:00:35 localhost python3[37253]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:35 localhost python3[37296]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748834.8026755-101602-237376331474851/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:36 localhost python3[37326]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:00:36 localhost systemd[1]: Reloading. Dec 3 03:00:36 localhost systemd-rc-local-generator[37351]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:00:36 localhost systemd-sysv-generator[37356]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:00:36 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:00:36 localhost systemd[1]: Reloading. Dec 3 03:00:36 localhost systemd-rc-local-generator[37389]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:00:36 localhost systemd-sysv-generator[37395]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:00:36 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:00:36 localhost systemd[1]: Starting chronyd online sources service... Dec 3 03:00:36 localhost chronyc[37402]: 200 OK Dec 3 03:00:36 localhost systemd[1]: chrony-online.service: Deactivated successfully. Dec 3 03:00:36 localhost systemd[1]: Finished chronyd online sources service. Dec 3 03:00:37 localhost python3[37418]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:37 localhost chronyd[37204]: System clock was stepped by 0.000000 seconds Dec 3 03:00:37 localhost python3[37435]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:38 localhost chronyd[37204]: Selected source 23.133.168.246 (pool.ntp.org) Dec 3 03:00:40 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=152.32.217.65 DST=38.102.83.198 LEN=40 TOS=0x08 PREC=0x40 TTL=35 ID=0 DF PROTO=TCP SPT=58108 DPT=22 SEQ=3842035255 ACK=0 WINDOW=0 RES=0x00 RST URGP=0 Dec 3 03:00:47 localhost python3[37452]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:47 localhost chronyd[37204]: System clock was stepped by -0.000000 seconds Dec 3 03:00:48 localhost python3[37469]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:48 localhost python3[37486]: ansible-timezone Invoked with name=UTC hwclock=None Dec 3 03:00:48 localhost systemd[1]: Starting Time & Date Service... Dec 3 03:00:48 localhost systemd[1]: Started Time & Date Service. Dec 3 03:00:49 localhost python3[37506]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:50 localhost python3[37523]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:50 localhost python3[37540]: ansible-slurp Invoked with src=/etc/tuned/active_profile Dec 3 03:00:51 localhost python3[37556]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 03:00:52 localhost python3[37572]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:53 localhost python3[37588]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Dec 3 03:00:53 localhost python3[37604]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:53 localhost python3[37620]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:54 localhost python3[37636]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:54 localhost python3[37652]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 03:00:55 localhost kernel: SELinux: Converting 2723 SID table entries... Dec 3 03:00:55 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 03:00:55 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 03:00:55 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=15 res=1 Dec 3 03:00:55 localhost python3[37692]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:57 localhost python3[37829]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Dec 3 03:00:57 localhost rsyslogd[758]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Dec 3 03:00:58 localhost python3[37845]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:58 localhost python3[37861]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:59 localhost python3[37877]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Dec 3 03:00:59 localhost rsyslogd[758]: message too long (37323) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Dec 3 03:01:08 localhost python3[37904]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 03:01:10 localhost python3[37920]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005543225.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Dec 3 03:01:11 localhost python3[37942]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:12 localhost python3[37958]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Dec 3 03:01:12 localhost systemd[1]: Reloading. Dec 3 03:01:12 localhost systemd-sysv-generator[37993]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:12 localhost systemd-rc-local-generator[37990]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:12 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:12 localhost chronyd[37204]: chronyd exiting Dec 3 03:01:12 localhost systemd[1]: Stopping NTP client/server... Dec 3 03:01:12 localhost systemd[1]: chronyd.service: Deactivated successfully. Dec 3 03:01:12 localhost systemd[1]: Stopped NTP client/server. Dec 3 03:01:12 localhost systemd[1]: Starting NTP client/server... Dec 3 03:01:13 localhost chronyd[38008]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Dec 3 03:01:13 localhost chronyd[38008]: Frequency -26.162 +/- 0.176 ppm read from /var/lib/chrony/drift Dec 3 03:01:13 localhost chronyd[38008]: Loaded seccomp filter (level 2) Dec 3 03:01:13 localhost systemd[1]: Started NTP client/server. Dec 3 03:01:17 localhost chronyd[38008]: Selected source 23.133.168.247 (pool.ntp.org) Dec 3 03:01:18 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Dec 3 03:01:19 localhost python3[38029]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543225.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Dec 3 03:01:21 localhost python3[38050]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:01:22 localhost python3[38067]: ansible-ipaclient_set_hostname Invoked with hostname=np0005543225.ooo.test Dec 3 03:01:22 localhost systemd[1]: Starting Hostname Service... Dec 3 03:01:22 localhost systemd[1]: Started Hostname Service. Dec 3 03:01:22 localhost systemd-hostnamed[38070]: Hostname set to (static) Dec 3 03:01:22 localhost python3[38086]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543225.ooo.test kdc=ipa.ooo.test on_master=False Dec 3 03:01:23 localhost python3[38107]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005543225.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmpak24i1m_ principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Dec 3 03:01:24 localhost python3[38107]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Dec 3 03:01:25 localhost python3[38128]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543225.ooo.test basedn=dc=ooo,dc=test Dec 3 03:01:26 localhost python3[38145]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543225.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Dec 3 03:01:26 localhost systemd-journald[617]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Dec 3 03:01:26 localhost systemd-journald[617]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 03:01:26 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 03:01:26 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 03:01:26 localhost python3[38163]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005543225.ooo.test krb_name=/tmp/tmpak24i1m_ debug=False Dec 3 03:01:28 localhost python3[38192]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005543225.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmpak24i1m_ ip_addresses=None Dec 3 03:01:32 localhost systemd[1]: Starting System Security Services Daemon... Dec 3 03:01:33 localhost sssd[38227]: Starting up Dec 3 03:01:33 localhost sssd_be[38228]: Starting up Dec 3 03:01:33 localhost sssd_sudo[38232]: Starting up Dec 3 03:01:33 localhost sssd_pam[38230]: Starting up Dec 3 03:01:33 localhost sssd_ssh[38231]: Starting up Dec 3 03:01:33 localhost sssd_nss[38229]: Starting up Dec 3 03:01:33 localhost sssd_pac[38233]: Starting up Dec 3 03:01:33 localhost systemd[1]: Started System Security Services Daemon. Dec 3 03:01:33 localhost systemd[1]: Reloading. Dec 3 03:01:33 localhost systemd-sysv-generator[38262]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:33 localhost systemd-rc-local-generator[38257]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:33 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:34 localhost python3[38287]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Dec 3 03:01:34 localhost systemd[1]: Stopping OpenSSH server daemon... Dec 3 03:01:34 localhost systemd[1]: sshd.service: Deactivated successfully. Dec 3 03:01:34 localhost systemd[1]: Stopped OpenSSH server daemon. Dec 3 03:01:34 localhost systemd[1]: Stopped target sshd-keygen.target. Dec 3 03:01:34 localhost systemd[1]: Stopping sshd-keygen.target... Dec 3 03:01:34 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:01:34 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:01:34 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:01:34 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 03:01:34 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 03:01:34 localhost sshd[38292]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:01:34 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 03:01:35 localhost python3[38310]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Dec 3 03:01:36 localhost python3[38327]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Dec 3 03:01:36 localhost systemd[1]: Reloading. Dec 3 03:01:36 localhost systemd-rc-local-generator[38358]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:36 localhost systemd-sysv-generator[38362]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:36 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:36 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Dec 3 03:01:36 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Dec 3 03:01:36 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Dec 3 03:01:36 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Dec 3 03:01:36 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Dec 3 03:01:37 localhost python3[38387]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpak24i1m_ state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:37 localhost python3[38403]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005543225.ooo.test sssd=True force=True Dec 3 03:01:38 localhost python3[38424]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005543225.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Dec 3 03:01:39 localhost python3[38443]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:39 localhost python3[38459]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpak24i1m_ state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:39 localhost python3[38475]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpak24i1m_.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:40 localhost python3[38491]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 03:01:40 localhost systemd[1]: Reloading. Dec 3 03:01:40 localhost systemd-rc-local-generator[38514]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:40 localhost systemd-sysv-generator[38519]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:40 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:40 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Dec 3 03:01:40 localhost certmonger[38530]: 2025-12-03 08:01:40 [38530] Changing to root directory. Dec 3 03:01:40 localhost certmonger[38530]: 2025-12-03 08:01:40 [38530] Obtaining system lock. Dec 3 03:01:40 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Dec 3 03:01:40 localhost certmonger[38531]: 2025-12-03 08:01:40 [38531] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:40 localhost certmonger[38532]: 2025-12-03 08:01:40 [38532] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:40 localhost certmonger[38533]: 2025-12-03 08:01:40 [38533] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:40 localhost certmonger[38534]: 2025-12-03 08:01:40 [38534] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:40 localhost certmonger[38535]: 2025-12-03 08:01:40 [38535] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:40 localhost certmonger[38536]: 2025-12-03 08:01:40 [38536] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:40 localhost certmonger[38537]: 2025-12-03 08:01:40 [38537] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:40 localhost certmonger[38538]: 2025-12-03 08:01:40 [38538] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:40 localhost certmonger[38539]: 2025-12-03 08:01:40 [38539] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:40 localhost certmonger[38540]: 2025-12-03 08:01:40 [38540] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:40 localhost certmonger[38541]: 2025-12-03 08:01:40 [38541] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:40 localhost certmonger[38542]: 2025-12-03 08:01:40 [38542] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:40 localhost certmonger[38543]: 2025-12-03 08:01:40 [38543] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:40 localhost certmonger[38544]: 2025-12-03 08:01:40 [38544] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:40 localhost certmonger[38545]: 2025-12-03 08:01:40 [38545] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:40 localhost certmonger[38546]: 2025-12-03 08:01:40 [38546] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:40 localhost certmonger[38547]: 2025-12-03 08:01:40 [38547] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:40 localhost certmonger[38548]: 2025-12-03 08:01:40 [38548] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:40 localhost certmonger[38549]: 2025-12-03 08:01:40 [38549] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:40 localhost certmonger[38550]: 2025-12-03 08:01:40 [38550] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:40 localhost certmonger[38551]: 2025-12-03 08:01:40 [38551] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:40 localhost certmonger[38552]: 2025-12-03 08:01:40 [38552] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:40 localhost certmonger[38553]: 2025-12-03 08:01:40 [38553] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:40 localhost certmonger[38554]: 2025-12-03 08:01:40 [38554] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:40 localhost certmonger[38530]: 2025-12-03 08:01:40 [38530] No hooks set for ca-pre-save command. Dec 3 03:01:40 localhost certmonger[38530]: 2025-12-03 08:01:40 [38530] No hooks set for ca-post-save command. Dec 3 03:01:40 localhost certmonger[38557]: 2025-12-03 08:01:40 [38557] Certificate "Local Signing Authority" valid for 31535999s. Dec 3 03:01:41 localhost certmonger[38530]: 2025-12-03 08:01:41 [38530] No hooks set for ca-pre-save command. Dec 3 03:01:41 localhost certmonger[38530]: 2025-12-03 08:01:41 [38530] No hooks set for ca-post-save command. Dec 3 03:01:41 localhost certmonger[38560]: 2025-12-03 08:01:41 [38560] Certificate "OOO.TEST IPA CA" valid for 631151018s. Dec 3 03:01:50 localhost python3[38608]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:01:50 localhost python3[38651]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748909.7270875-104925-271363316470984/source _original_basename=tmpntl8droz follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:50 localhost python3[38681]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 03:01:52 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 03:01:53 localhost python3[38806]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:01:54 localhost python3[38927]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Dec 3 03:01:56 localhost python3[38943]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 03:01:56 localhost python3[38959]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 03:01:57 localhost python3[38975]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 03:01:58 localhost python3[38995]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:02:01 localhost python3[39012]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:02:04 localhost python3[39029]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:02:04 localhost python3[39045]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:02:05 localhost python3[39061]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:02:06 localhost systemd[1]: Reloading. Dec 3 03:02:06 localhost systemd-rc-local-generator[39092]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:02:06 localhost systemd-sysv-generator[39096]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:02:06 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:02:07 localhost python3[39116]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005543225.ctlplane.ooo.test'] principal=['HTTP/np0005543225.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.ctlplane.ooo.test" for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.ctlplane.ooo.test Dec 3 03:02:07 localhost certmonger[39126]: " for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543225.ctlplane.ooo.test@OOO.TEST Dec 3 03:02:07 localhost certmonger[39126]: " for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:07 localhost certmonger[39126]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTQzMjI1LmN0bHBsYW5lLm9v Dec 3 03:02:07 localhost certmonger[39126]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlAZNgjwH+RNx Dec 3 03:02:07 localhost certmonger[39126]: qO8HfZxR45KEM9tTGbXGtE/axJMoB8kwuYOvAR2xtHnYVbqrPLKABiNASc5HTWi0 Dec 3 03:02:07 localhost certmonger[39126]: J34ZEs/n729ZGAwdFSwT3+QGDTEpXcWOSbYoetgW7JQahpoqpE9VwC7ssO6j2qky Dec 3 03:02:07 localhost certmonger[39126]: GcgYe6CtovU6FsB4tZzg/jNYGbCf8cEBQAQ4EYZAmVvJOsqMm8BVuDCqwrNhES1e Dec 3 03:02:07 localhost certmonger[39126]: O8tL2/beNxP8mADd3xC0w2aoOLBshK4Sn4JSRgvF/knfRyF6Zl/wPzaiizQ1osEH Dec 3 03:02:07 localhost certmonger[39126]: wqLPSHnIqJ1zF2YXQxBcC4LpcfBCQvyXd8E94TTF57yDGYrNEKMnYAnLoinIwjx7 Dec 3 03:02:07 localhost certmonger[39126]: 6suqcL5icwIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAA Dec 3 03:02:07 localhost certmonger[39126]: MwAwADgAMAAyADAANzCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Dec 3 03:02:07 localhost certmonger[39126]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1NDMyMjUuY3RscGxhbmUub29vLnRlc3Sg Dec 3 03:02:07 localhost certmonger[39126]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28u Dec 3 03:02:07 localhost certmonger[39126]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Dec 3 03:02:07 localhost certmonger[39126]: oSgwJhsESFRUUBsebnAwMDA1NTQzMjI1LmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Dec 3 03:02:07 localhost certmonger[39126]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Dec 3 03:02:07 localhost certmonger[39126]: BBTUYqdT2o13dOsYHvDv0FZmlZJ7ojANBgkqhkiG9w0BAQsFAAOCAQEAjPDLqK/5 Dec 3 03:02:07 localhost certmonger[39126]: 1fdQdMV30la8oR6tW2GLOOyYEpjP5pRa+qlRBS7dQVH4tm2xGUbSPHIvZ7ZfQ+7y Dec 3 03:02:07 localhost certmonger[39126]: 6qaO7mVYKhUKT0ZFnuF09siy8k8kqNjVYkQc3YCHasedus7Elg+I0u/A+QDV27Wl Dec 3 03:02:07 localhost certmonger[39126]: et0DOqXaDRHQLyVuznaZLZg5SmKHCbL4bKUzZ0fMazifC63U4wV3+gtYtQkK2Ibe Dec 3 03:02:07 localhost certmonger[39126]: 1pQSOz+EZvdMhhlfvmiSQ6i/OKVUdm4nJXuCrkfqybZ/sout5fieWafik+2vfTd7 Dec 3 03:02:07 localhost certmonger[39126]: y4suTdinw2J1hsC5p7KsD86pqA3TR4xilZNVtO8jvSx53UaYotVxZg77lJpSxR5J Dec 3 03:02:07 localhost certmonger[39126]: rPd7UZb3j9G1GA== Dec 3 03:02:07 localhost certmonger[39126]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:07 localhost certmonger[39126]: " for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlAZNgjwH+RNxqO8HfZxR45KEM9tTGbXGtE/axJMoB8kwuYOvAR2xtHnYVbqrPLKABiNASc5HTWi0J34ZEs/n729ZGAwdFSwT3+QGDTEpXcWOSbYoetgW7JQahpoqpE9VwC7ssO6j2qkyGcgYe6CtovU6FsB4tZzg/jNYGbCf8cEBQAQ4EYZAmVvJOsqMm8BVuDCqwrNhES1eO8tL2/beNxP8mADd3xC0w2aoOLBshK4Sn4JSRgvF/knfRyF6Zl/wPzaiizQ1osEHwqLPSHnIqJ1zF2YXQxBcC4LpcfBCQvyXd8E94TTF57yDGYrNEKMnYAnLoinIwjx76suqcL5icwIDAQAB" for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:07 localhost certmonger[39126]: 2025-12-03 08:02:07 [39126] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:07 localhost certmonger[38530]: 2025-12-03 08:02:07 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39126]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:08 localhost certmonger[39126]: Certificate: "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" Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Certificate submission still ongoing. Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Certificate submission attempt complete. Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Child status = 0. Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Child output: Dec 3 03:02:08 localhost certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:08 localhost certmonger[38530]: MIIFSTCCA7GgAwIBAgIBDzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:08 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:08 localhost certmonger[38530]: MDIwOFoXDTI3MTIwNDA4MDIwOFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:08 localhost certmonger[38530]: BAMMHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:08 localhost certmonger[38530]: AQEBBQADggEPADCCAQoCggEBAJQGTYI8B/kTcajvB32cUeOShDPbUxm1xrRP2sST Dec 3 03:02:08 localhost certmonger[38530]: KAfJMLmDrwEdsbR52FW6qzyygAYjQEnOR01otCd+GRLP5+9vWRgMHRUsE9/kBg0x Dec 3 03:02:08 localhost certmonger[38530]: KV3Fjkm2KHrYFuyUGoaaKqRPVcAu7LDuo9qpMhnIGHugraL1OhbAeLWc4P4zWBmw Dec 3 03:02:08 localhost certmonger[38530]: n/HBAUAEOBGGQJlbyTrKjJvAVbgwqsKzYREtXjvLS9v23jcT/JgA3d8QtMNmqDiw Dec 3 03:02:08 localhost certmonger[38530]: bISuEp+CUkYLxf5J30chemZf8D82oos0NaLBB8Kiz0h5yKidcxdmF0MQXAuC6XHw Dec 3 03:02:08 localhost certmonger[38530]: QkL8l3fBPeE0xee8gxmKzRCjJ2AJy6IpyMI8e+rLqnC+YnMCAwEAAaOCAd0wggHZ Dec 3 03:02:08 localhost certmonger[38530]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:08 localhost certmonger[38530]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:08 localhost certmonger[38530]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:08 localhost certmonger[38530]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:08 localhost certmonger[38530]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:08 localhost certmonger[38530]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOZXBHVqmvt7o0ww5/dPR6x3iS15 Dec 3 03:02:08 localhost certmonger[38530]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdKA8 Dec 3 03:02:08 localhost certmonger[38530]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI1LmN0bHBsYW5lLm9vby50 Dec 3 03:02:08 localhost certmonger[38530]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:08 localhost certmonger[38530]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjUuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Dec 3 03:02:08 localhost certmonger[38530]: hvcNAQELBQADggGBAIx2CLEoxkO943nyTJaN56rLj3cpWvpBjjb2UWxPvIjjbEQS Dec 3 03:02:08 localhost certmonger[38530]: ALbcvZWXUZptR/6VHilkjrA3fVR2n6ABxRsnMI71GeNOgo1TuP3I13NIGjjijAt7 Dec 3 03:02:08 localhost certmonger[38530]: 3FZt26IOf+MM+bAUy5Bu9c0x1rCUMFLljBH7wdWUemSiY1zOcT9nrd11EdAcbiZ9 Dec 3 03:02:08 localhost certmonger[38530]: 3eTWlFTEms/2IBQI7za8SNWAQbDKDUC59D1OLx+fdAZ88AoZM8zLAKpPS53nuXgB Dec 3 03:02:08 localhost certmonger[38530]: 5mxuIUIblu2j8TsYnN89K9493yoFrbFoAQHjzgPtZ8PVJfWaMxvf7WeEkp4KX/En Dec 3 03:02:08 localhost certmonger[38530]: P1WIr/6ejxYRN0o6FnQoYJIx+fxjV7oySPDMHY5wM8N984DmN7FWBdmQrhpdlbLD Dec 3 03:02:08 localhost certmonger[38530]: JqYy6APS1pSA2CRF4adkHxAHDkdMknjalqnnKrUAVOyhh/9dWiQFVkYKADgd4sPt Dec 3 03:02:08 localhost certmonger[38530]: nhrqXN7qH/1sGh12yf5GUkjFPtisNWSh3kILl4anLnrj4t0POLAZnTRfugSWfsBQ Dec 3 03:02:08 localhost certmonger[38530]: XWYd9hTIlqEZ1mKOYg== Dec 3 03:02:08 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:08 localhost certmonger[38530]: " Dec 3 03:02:08 localhost certmonger[39128]: 2025-12-03 08:02:08 [39128] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:08 localhost certmonger[39128]: MIIFSTCCA7GgAwIBAgIBDzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:08 localhost certmonger[39128]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:08 localhost certmonger[39128]: MDIwOFoXDTI3MTIwNDA4MDIwOFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:08 localhost certmonger[39128]: BAMMHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:08 localhost certmonger[39128]: AQEBBQADggEPADCCAQoCggEBAJQGTYI8B/kTcajvB32cUeOShDPbUxm1xrRP2sST Dec 3 03:02:08 localhost certmonger[39128]: KAfJMLmDrwEdsbR52FW6qzyygAYjQEnOR01otCd+GRLP5+9vWRgMHRUsE9/kBg0x Dec 3 03:02:08 localhost certmonger[39128]: KV3Fjkm2KHrYFuyUGoaaKqRPVcAu7LDuo9qpMhnIGHugraL1OhbAeLWc4P4zWBmw Dec 3 03:02:08 localhost certmonger[39128]: n/HBAUAEOBGGQJlbyTrKjJvAVbgwqsKzYREtXjvLS9v23jcT/JgA3d8QtMNmqDiw Dec 3 03:02:08 localhost certmonger[39128]: bISuEp+CUkYLxf5J30chemZf8D82oos0NaLBB8Kiz0h5yKidcxdmF0MQXAuC6XHw Dec 3 03:02:08 localhost certmonger[39128]: QkL8l3fBPeE0xee8gxmKzRCjJ2AJy6IpyMI8e+rLqnC+YnMCAwEAAaOCAd0wggHZ Dec 3 03:02:08 localhost certmonger[39128]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:08 localhost certmonger[39128]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:08 localhost certmonger[39128]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:08 localhost certmonger[39128]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:08 localhost certmonger[39128]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:08 localhost certmonger[39128]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOZXBHVqmvt7o0ww5/dPR6x3iS15 Dec 3 03:02:08 localhost certmonger[39128]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdKA8 Dec 3 03:02:08 localhost certmonger[39128]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI1LmN0bHBsYW5lLm9vby50 Dec 3 03:02:08 localhost certmonger[39128]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:08 localhost certmonger[39128]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjUuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Dec 3 03:02:08 localhost certmonger[39128]: hvcNAQELBQADggGBAIx2CLEoxkO943nyTJaN56rLj3cpWvpBjjb2UWxPvIjjbEQS Dec 3 03:02:08 localhost certmonger[39128]: ALbcvZWXUZptR/6VHilkjrA3fVR2n6ABxRsnMI71GeNOgo1TuP3I13NIGjjijAt7 Dec 3 03:02:08 localhost certmonger[39128]: 3FZt26IOf+MM+bAUy5Bu9c0x1rCUMFLljBH7wdWUemSiY1zOcT9nrd11EdAcbiZ9 Dec 3 03:02:08 localhost certmonger[39128]: 3eTWlFTEms/2IBQI7za8SNWAQbDKDUC59D1OLx+fdAZ88AoZM8zLAKpPS53nuXgB Dec 3 03:02:08 localhost certmonger[39128]: 5mxuIUIblu2j8TsYnN89K9493yoFrbFoAQHjzgPtZ8PVJfWaMxvf7WeEkp4KX/En Dec 3 03:02:08 localhost certmonger[39128]: P1WIr/6ejxYRN0o6FnQoYJIx+fxjV7oySPDMHY5wM8N984DmN7FWBdmQrhpdlbLD Dec 3 03:02:08 localhost certmonger[39128]: JqYy6APS1pSA2CRF4adkHxAHDkdMknjalqnnKrUAVOyhh/9dWiQFVkYKADgd4sPt Dec 3 03:02:08 localhost certmonger[39128]: nhrqXN7qH/1sGh12yf5GUkjFPtisNWSh3kILl4anLnrj4t0POLAZnTRfugSWfsBQ Dec 3 03:02:08 localhost certmonger[39128]: XWYd9hTIlqEZ1mKOYg== Dec 3 03:02:08 localhost certmonger[39128]: -----END CERTIFICATE----- Dec 3 03:02:08 localhost certmonger[39128]: ". Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Certificate submission still ongoing. Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Certificate submission postprocessing complete. Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Child status = 0. Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Child output: Dec 3 03:02:08 localhost certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nXWYd9hTIlqEZ1mKOYg==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:08 localhost certmonger[38530]: " Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:08 localhost certmonger[38530]: MIIFSTCCA7GgAwIBAgIBDzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:08 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:08 localhost certmonger[38530]: MDIwOFoXDTI3MTIwNDA4MDIwOFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:08 localhost certmonger[38530]: BAMMHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:08 localhost certmonger[38530]: AQEBBQADggEPADCCAQoCggEBAJQGTYI8B/kTcajvB32cUeOShDPbUxm1xrRP2sST Dec 3 03:02:08 localhost certmonger[38530]: KAfJMLmDrwEdsbR52FW6qzyygAYjQEnOR01otCd+GRLP5+9vWRgMHRUsE9/kBg0x Dec 3 03:02:08 localhost certmonger[38530]: KV3Fjkm2KHrYFuyUGoaaKqRPVcAu7LDuo9qpMhnIGHugraL1OhbAeLWc4P4zWBmw Dec 3 03:02:08 localhost certmonger[38530]: n/HBAUAEOBGGQJlbyTrKjJvAVbgwqsKzYREtXjvLS9v23jcT/JgA3d8QtMNmqDiw Dec 3 03:02:08 localhost certmonger[38530]: bISuEp+CUkYLxf5J30chemZf8D82oos0NaLBB8Kiz0h5yKidcxdmF0MQXAuC6XHw Dec 3 03:02:08 localhost certmonger[38530]: QkL8l3fBPeE0xee8gxmKzRCjJ2AJy6IpyMI8e+rLqnC+YnMCAwEAAaOCAd0wggHZ Dec 3 03:02:08 localhost certmonger[38530]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:08 localhost certmonger[38530]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:08 localhost certmonger[38530]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:08 localhost certmonger[38530]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:08 localhost certmonger[38530]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:08 localhost certmonger[38530]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOZXBHVqmvt7o0ww5/dPR6x3iS15 Dec 3 03:02:08 localhost certmonger[38530]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdKA8 Dec 3 03:02:08 localhost certmonger[38530]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI1LmN0bHBsYW5lLm9vby50 Dec 3 03:02:08 localhost certmonger[38530]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:08 localhost certmonger[38530]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjUuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Dec 3 03:02:08 localhost certmonger[38530]: hvcNAQELBQADggGBAIx2CLEoxkO943nyTJaN56rLj3cpWvpBjjb2UWxPvIjjbEQS Dec 3 03:02:08 localhost certmonger[38530]: ALbcvZWXUZptR/6VHilkjrA3fVR2n6ABxRsnMI71GeNOgo1TuP3I13NIGjjijAt7 Dec 3 03:02:08 localhost certmonger[38530]: 3FZt26IOf+MM+bAUy5Bu9c0x1rCUMFLljBH7wdWUemSiY1zOcT9nrd11EdAcbiZ9 Dec 3 03:02:08 localhost certmonger[38530]: 3eTWlFTEms/2IBQI7za8SNWAQbDKDUC59D1OLx+fdAZ88AoZM8zLAKpPS53nuXgB Dec 3 03:02:08 localhost certmonger[38530]: 5mxuIUIblu2j8TsYnN89K9493yoFrbFoAQHjzgPtZ8PVJfWaMxvf7WeEkp4KX/En Dec 3 03:02:08 localhost certmonger[38530]: P1WIr/6ejxYRN0o6FnQoYJIx+fxjV7oySPDMHY5wM8N984DmN7FWBdmQrhpdlbLD Dec 3 03:02:08 localhost certmonger[38530]: JqYy6APS1pSA2CRF4adkHxAHDkdMknjalqnnKrUAVOyhh/9dWiQFVkYKADgd4sPt Dec 3 03:02:08 localhost certmonger[38530]: nhrqXN7qH/1sGh12yf5GUkjFPtisNWSh3kILl4anLnrj4t0POLAZnTRfugSWfsBQ Dec 3 03:02:08 localhost certmonger[38530]: XWYd9hTIlqEZ1mKOYg== Dec 3 03:02:08 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:08 localhost certmonger[38530]: ". Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] No hooks set for pre-save command. Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost certmonger[39136]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Dec 3 03:02:08 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 3 03:02:08 localhost certmonger[38530]: 2025-12-03 08:02:08 [38530] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 3 03:02:08 localhost python3[39154]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005543225.storage.ooo.test'] principal=['HTTP/np0005543225.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:08 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Dec 3 03:02:08 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.storage.ooo.test" for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.storage.ooo.test Dec 3 03:02:09 localhost certmonger[39173]: " for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543225.storage.ooo.test@OOO.TEST Dec 3 03:02:09 localhost certmonger[39173]: " for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:09 localhost certmonger[39173]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29v Dec 3 03:02:09 localhost certmonger[39173]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCjL3Fp6j1xXrc9 Dec 3 03:02:09 localhost certmonger[39173]: xME6vaalZ9Snja5591oWEfIRbfb7o19n/zrrZBbeBgXHicYZOKny+IXvO43eHfQI Dec 3 03:02:09 localhost certmonger[39173]: eClcZyeuPHSmMDUDXs2dZpeUrh1uUlgl2tBVmrT0XI82fDjbuzpqamIKrE1Ounn+ Dec 3 03:02:09 localhost certmonger[39173]: J+Wyv3AGf0/YEtduavbBUlO5kivWAIP8j5P9OvB6vEEf1eSN5RqzNg4woz3zKm+A Dec 3 03:02:09 localhost certmonger[39173]: pvq77ZbpuRnXNXLhRSV4tCgjczBFY6AFwql/veHDIF5ZYtWsSvGnJLjU6tOCuOkW Dec 3 03:02:09 localhost certmonger[39173]: HHiZxCB7r3+2bj027IHpY5V9O4AdTZiPswdyPeygfdRMOvBEKhYqHMcZY31+vf27 Dec 3 03:02:09 localhost certmonger[39173]: NAvUKK5bAgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADIAMAAz Dec 3 03:02:09 localhost certmonger[39173]: ADAAOAAwADIAMAA5MIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Dec 3 03:02:09 localhost certmonger[39173]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0oDsG Dec 3 03:02:09 localhost certmonger[39173]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1NDMyMjUuc3RvcmFnZS5vb28udGVz Dec 3 03:02:09 localhost certmonger[39173]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Dec 3 03:02:09 localhost certmonger[39173]: JRsESFRUUBsdbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Dec 3 03:02:09 localhost certmonger[39173]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFP6n Dec 3 03:02:09 localhost certmonger[39173]: O4lSaCbvwSVT2uVPNAfI3CMvMA0GCSqGSIb3DQEBCwUAA4IBAQCCdeLNAp/YxKOm Dec 3 03:02:09 localhost certmonger[39173]: lCnehYXtjZhTWC9HgOVn0Hks2GJynDpoAK5MpYGuv+/JQ48MowsUXOXqtJ9rRp0s Dec 3 03:02:09 localhost certmonger[39173]: //7jUJK7Ytl7hUMnWdzOEUdt8YavmE+TIhSj8JErk9YEBspqb5Gkiy3taRzeSq61 Dec 3 03:02:09 localhost certmonger[39173]: vSv0JG70JGok2Qyu34dACb6e9PG5F1A0t8zDkUO+y38D8SwrC//JP3KWo6I2647U Dec 3 03:02:09 localhost certmonger[39173]: 7txIyIS9P49pcaGRxn23+8rI1kmN5mXDd8fiUkk3sTogKvtsg9/vcxITqJBpzSX+ Dec 3 03:02:09 localhost certmonger[39173]: hDSvsqG4Q3ASIHDKiutyS9rBQVCsRfoqNd+dl/l0D267QrjERV9GXczq3TWSDzsk Dec 3 03:02:09 localhost certmonger[39173]: Pun9iOWu Dec 3 03:02:09 localhost certmonger[39173]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:09 localhost certmonger[39173]: " for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoy9xaeo9cV63PcTBOr2mpWfUp42uefdaFhHyEW32+6NfZ/8662QW3gYFx4nGGTip8viF7zuN3h30CHgpXGcnrjx0pjA1A17NnWaXlK4dblJYJdrQVZq09FyPNnw427s6ampiCqxNTrp5/iflsr9wBn9P2BLXbmr2wVJTuZIr1gCD/I+T/TrwerxBH9XkjeUaszYOMKM98ypvgKb6u+2W6bkZ1zVy4UUleLQoI3MwRWOgBcKpf73hwyBeWWLVrErxpyS41OrTgrjpFhx4mcQge69/tm49NuyB6WOVfTuAHU2Yj7MHcj3soH3UTDrwRCoWKhzHGWN9fr39uzQL1CiuWwIDAQAB" for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:09 localhost certmonger[39173]: 2025-12-03 08:02:09 [39173] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:09 localhost certmonger[38530]: 2025-12-03 08:02:09 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:09 localhost certmonger[39173]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:09 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:09 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:09 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[39173]: Certificate: "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" Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Certificate submission still ongoing. Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Certificate submission attempt complete. Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Child status = 0. Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Child output: Dec 3 03:02:10 localhost certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[38530]: MIIFRTCCA62gAwIBAgIBEjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:10 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:10 localhost certmonger[38530]: MDIxMFoXDTI3MTIwNDA4MDIxMFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 03:02:10 localhost certmonger[38530]: BAMMHW5wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 03:02:10 localhost certmonger[38530]: AQEFAAOCAQ8AMIIBCgKCAQEAoy9xaeo9cV63PcTBOr2mpWfUp42uefdaFhHyEW32 Dec 3 03:02:10 localhost certmonger[38530]: +6NfZ/8662QW3gYFx4nGGTip8viF7zuN3h30CHgpXGcnrjx0pjA1A17NnWaXlK4d Dec 3 03:02:10 localhost certmonger[38530]: blJYJdrQVZq09FyPNnw427s6ampiCqxNTrp5/iflsr9wBn9P2BLXbmr2wVJTuZIr Dec 3 03:02:10 localhost certmonger[38530]: 1gCD/I+T/TrwerxBH9XkjeUaszYOMKM98ypvgKb6u+2W6bkZ1zVy4UUleLQoI3Mw Dec 3 03:02:10 localhost certmonger[38530]: RWOgBcKpf73hwyBeWWLVrErxpyS41OrTgrjpFhx4mcQge69/tm49NuyB6WOVfTuA Dec 3 03:02:10 localhost certmonger[38530]: HU2Yj7MHcj3soH3UTDrwRCoWKhzHGWN9fr39uzQL1CiuWwIDAQABo4IB2jCCAdYw Dec 3 03:02:10 localhost certmonger[38530]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 03:02:10 localhost certmonger[38530]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 03:02:10 localhost certmonger[38530]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 03:02:10 localhost certmonger[38530]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 03:02:10 localhost certmonger[38530]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 03:02:10 localhost certmonger[38530]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUVowD9VLSI4Yn344Hsxw1x9OOazgw Dec 3 03:02:10 localhost certmonger[38530]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3SgOwYK Dec 3 03:02:10 localhost certmonger[38530]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0 Dec 3 03:02:10 localhost certmonger[38530]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Dec 3 03:02:10 localhost certmonger[38530]: GwRIVFRQGx1ucDAwMDU1NDMyMjUuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Dec 3 03:02:10 localhost certmonger[38530]: AQsFAAOCAYEAiVNQ4Dxwe+QXzfCW33AIgONe8Yz3DFr90ptHi7Lz/H1hSIKcDnta Dec 3 03:02:10 localhost certmonger[38530]: 2Qz8YlTGHtQ7lf0fMnY0nCejbKYsDGoHcCM8LqkI2E6N46YXT81PFtImIRdZvxcc Dec 3 03:02:10 localhost certmonger[38530]: JXVYmsGGui7n31yZmJFuv/MW5Ke7EeN37HWRTF2Bel6Gg1MwrN18oGFcq7BgiR3d Dec 3 03:02:10 localhost certmonger[38530]: 8vZOwZK+e74zl5eec9gzaIwnhDQGzwcLqFAqCQ1b7tXE22W7XhSreuyjl0s9jto6 Dec 3 03:02:10 localhost certmonger[38530]: Nhg1hTYlEU2IlusXy1yJ8VFfkTqFFtEixZ+9wvy3c+dGexbItfUry7F3LTZ5hbl6 Dec 3 03:02:10 localhost certmonger[38530]: 1sD1pyyOfD414jiPk5BLP2tqBj47lZYu+UXQOfJtMXtIZNeIok7tV/YAuOEyA8P0 Dec 3 03:02:10 localhost certmonger[38530]: anGLEK3lIN444F20lDiwoT8wo8jCD8pEQ0HwR40Y2oRWEDijRcUurD65bTDo+T8A Dec 3 03:02:10 localhost certmonger[38530]: OabrlI2f2iJ4OgZP9ifwniDx9j6ezPwtqgY50ize/htAPHd02dAQEa8gcwbIADki Dec 3 03:02:10 localhost certmonger[38530]: kE9myDAFsGoQ Dec 3 03:02:10 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[38530]: " Dec 3 03:02:10 localhost certmonger[39176]: 2025-12-03 08:02:10 [39176] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39176]: MIIFRTCCA62gAwIBAgIBEjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:10 localhost certmonger[39176]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:10 localhost certmonger[39176]: MDIxMFoXDTI3MTIwNDA4MDIxMFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 03:02:10 localhost certmonger[39176]: BAMMHW5wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 03:02:10 localhost certmonger[39176]: AQEFAAOCAQ8AMIIBCgKCAQEAoy9xaeo9cV63PcTBOr2mpWfUp42uefdaFhHyEW32 Dec 3 03:02:10 localhost certmonger[39176]: +6NfZ/8662QW3gYFx4nGGTip8viF7zuN3h30CHgpXGcnrjx0pjA1A17NnWaXlK4d Dec 3 03:02:10 localhost certmonger[39176]: blJYJdrQVZq09FyPNnw427s6ampiCqxNTrp5/iflsr9wBn9P2BLXbmr2wVJTuZIr Dec 3 03:02:10 localhost certmonger[39176]: 1gCD/I+T/TrwerxBH9XkjeUaszYOMKM98ypvgKb6u+2W6bkZ1zVy4UUleLQoI3Mw Dec 3 03:02:10 localhost certmonger[39176]: RWOgBcKpf73hwyBeWWLVrErxpyS41OrTgrjpFhx4mcQge69/tm49NuyB6WOVfTuA Dec 3 03:02:10 localhost certmonger[39176]: HU2Yj7MHcj3soH3UTDrwRCoWKhzHGWN9fr39uzQL1CiuWwIDAQABo4IB2jCCAdYw Dec 3 03:02:10 localhost certmonger[39176]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 03:02:10 localhost certmonger[39176]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 03:02:10 localhost certmonger[39176]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 03:02:10 localhost certmonger[39176]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 03:02:10 localhost certmonger[39176]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 03:02:10 localhost certmonger[39176]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUVowD9VLSI4Yn344Hsxw1x9OOazgw Dec 3 03:02:10 localhost certmonger[39176]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3SgOwYK Dec 3 03:02:10 localhost certmonger[39176]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0 Dec 3 03:02:10 localhost certmonger[39176]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Dec 3 03:02:10 localhost certmonger[39176]: GwRIVFRQGx1ucDAwMDU1NDMyMjUuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Dec 3 03:02:10 localhost certmonger[39176]: AQsFAAOCAYEAiVNQ4Dxwe+QXzfCW33AIgONe8Yz3DFr90ptHi7Lz/H1hSIKcDnta Dec 3 03:02:10 localhost certmonger[39176]: 2Qz8YlTGHtQ7lf0fMnY0nCejbKYsDGoHcCM8LqkI2E6N46YXT81PFtImIRdZvxcc Dec 3 03:02:10 localhost certmonger[39176]: JXVYmsGGui7n31yZmJFuv/MW5Ke7EeN37HWRTF2Bel6Gg1MwrN18oGFcq7BgiR3d Dec 3 03:02:10 localhost certmonger[39176]: 8vZOwZK+e74zl5eec9gzaIwnhDQGzwcLqFAqCQ1b7tXE22W7XhSreuyjl0s9jto6 Dec 3 03:02:10 localhost certmonger[39176]: Nhg1hTYlEU2IlusXy1yJ8VFfkTqFFtEixZ+9wvy3c+dGexbItfUry7F3LTZ5hbl6 Dec 3 03:02:10 localhost certmonger[39176]: 1sD1pyyOfD414jiPk5BLP2tqBj47lZYu+UXQOfJtMXtIZNeIok7tV/YAuOEyA8P0 Dec 3 03:02:10 localhost certmonger[39176]: anGLEK3lIN444F20lDiwoT8wo8jCD8pEQ0HwR40Y2oRWEDijRcUurD65bTDo+T8A Dec 3 03:02:10 localhost certmonger[39176]: OabrlI2f2iJ4OgZP9ifwniDx9j6ezPwtqgY50ize/htAPHd02dAQEa8gcwbIADki Dec 3 03:02:10 localhost certmonger[39176]: kE9myDAFsGoQ Dec 3 03:02:10 localhost certmonger[39176]: -----END CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39176]: ". Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Certificate submission still ongoing. Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Certificate submission postprocessing complete. Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Child status = 0. Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Child output: Dec 3 03:02:10 localhost certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nkE9myDAFsGoQ\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:10 localhost certmonger[38530]: " Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[38530]: MIIFRTCCA62gAwIBAgIBEjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:10 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:10 localhost certmonger[38530]: MDIxMFoXDTI3MTIwNDA4MDIxMFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 03:02:10 localhost certmonger[38530]: BAMMHW5wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 03:02:10 localhost certmonger[38530]: AQEFAAOCAQ8AMIIBCgKCAQEAoy9xaeo9cV63PcTBOr2mpWfUp42uefdaFhHyEW32 Dec 3 03:02:10 localhost certmonger[38530]: +6NfZ/8662QW3gYFx4nGGTip8viF7zuN3h30CHgpXGcnrjx0pjA1A17NnWaXlK4d Dec 3 03:02:10 localhost certmonger[38530]: blJYJdrQVZq09FyPNnw427s6ampiCqxNTrp5/iflsr9wBn9P2BLXbmr2wVJTuZIr Dec 3 03:02:10 localhost certmonger[38530]: 1gCD/I+T/TrwerxBH9XkjeUaszYOMKM98ypvgKb6u+2W6bkZ1zVy4UUleLQoI3Mw Dec 3 03:02:10 localhost certmonger[38530]: RWOgBcKpf73hwyBeWWLVrErxpyS41OrTgrjpFhx4mcQge69/tm49NuyB6WOVfTuA Dec 3 03:02:10 localhost certmonger[38530]: HU2Yj7MHcj3soH3UTDrwRCoWKhzHGWN9fr39uzQL1CiuWwIDAQABo4IB2jCCAdYw Dec 3 03:02:10 localhost certmonger[38530]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 03:02:10 localhost certmonger[38530]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 03:02:10 localhost certmonger[38530]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 03:02:10 localhost certmonger[38530]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 03:02:10 localhost certmonger[38530]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 03:02:10 localhost certmonger[38530]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUVowD9VLSI4Yn344Hsxw1x9OOazgw Dec 3 03:02:10 localhost certmonger[38530]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3SgOwYK Dec 3 03:02:10 localhost certmonger[38530]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0 Dec 3 03:02:10 localhost certmonger[38530]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Dec 3 03:02:10 localhost certmonger[38530]: GwRIVFRQGx1ucDAwMDU1NDMyMjUuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Dec 3 03:02:10 localhost certmonger[38530]: AQsFAAOCAYEAiVNQ4Dxwe+QXzfCW33AIgONe8Yz3DFr90ptHi7Lz/H1hSIKcDnta Dec 3 03:02:10 localhost certmonger[38530]: 2Qz8YlTGHtQ7lf0fMnY0nCejbKYsDGoHcCM8LqkI2E6N46YXT81PFtImIRdZvxcc Dec 3 03:02:10 localhost certmonger[38530]: JXVYmsGGui7n31yZmJFuv/MW5Ke7EeN37HWRTF2Bel6Gg1MwrN18oGFcq7BgiR3d Dec 3 03:02:10 localhost certmonger[38530]: 8vZOwZK+e74zl5eec9gzaIwnhDQGzwcLqFAqCQ1b7tXE22W7XhSreuyjl0s9jto6 Dec 3 03:02:10 localhost certmonger[38530]: Nhg1hTYlEU2IlusXy1yJ8VFfkTqFFtEixZ+9wvy3c+dGexbItfUry7F3LTZ5hbl6 Dec 3 03:02:10 localhost certmonger[38530]: 1sD1pyyOfD414jiPk5BLP2tqBj47lZYu+UXQOfJtMXtIZNeIok7tV/YAuOEyA8P0 Dec 3 03:02:10 localhost certmonger[38530]: anGLEK3lIN444F20lDiwoT8wo8jCD8pEQ0HwR40Y2oRWEDijRcUurD65bTDo+T8A Dec 3 03:02:10 localhost certmonger[38530]: OabrlI2f2iJ4OgZP9ifwniDx9j6ezPwtqgY50ize/htAPHd02dAQEa8gcwbIADki Dec 3 03:02:10 localhost certmonger[38530]: kE9myDAFsGoQ Dec 3 03:02:10 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[38530]: ". Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] No hooks set for pre-save command. Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost certmonger[39184]: Certificate in file "/etc/pki/tls/certs/httpd-storage.crt" issued by CA and saved. Dec 3 03:02:10 localhost certmonger[38530]: 2025-12-03 08:02:10 [38530] Wrote to /var/lib/certmonger/requests/20251203080209 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost auditd[721]: queue to plugins is full - dropping event Dec 3 03:02:10 localhost auditd[721]: queue to plugins is full - dropping event Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost auditd[721]: queue to plugins is full - dropping event Dec 3 03:02:10 localhost auditd[721]: queue to plugins is full - dropping event Dec 3 03:02:10 localhost auditd[721]: queue to plugins is full - dropping event Dec 3 03:02:10 localhost auditd[721]: auditd queue full reporting limit reached - ending dropped event notifications Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:10 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost python3[39200]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005543225.storagemgmt.ooo.test'] principal=['HTTP/np0005543225.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.storagemgmt.ooo.test" for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.storagemgmt.ooo.test Dec 3 03:02:12 localhost certmonger[39210]: " for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543225.storagemgmt.ooo.test@OOO.TEST Dec 3 03:02:12 localhost certmonger[39210]: " for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:12 localhost certmonger[39210]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LnN0b3JhZ2VtZ210 Dec 3 03:02:12 localhost certmonger[39210]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsBSn+PML Dec 3 03:02:12 localhost certmonger[39210]: x8m0DqqdWuZcJp4YIi9SR9PsHw5ayCLCNoca1ZHkHFtZfLwNVA6pUDrJwBdUWXzR Dec 3 03:02:12 localhost certmonger[39210]: d1YsEoimO8c/9BdaPZN1oOqTYUt4Hsqq8rwh4NQrCIC+bOmyn1qkb5rOvCIR9TqC Dec 3 03:02:12 localhost certmonger[39210]: BLyLyX6g5SnH4l1yF+aZL+vniiX/tZS/lLMQZ/ZnZrif2A8Steow1wnK6XJ4+jLi Dec 3 03:02:12 localhost certmonger[39210]: CrrluH7BANkWlxpehPU47XujYkKdrcE6as79yBehkyA+ahXcnmHBx4GNzcCxkl8i Dec 3 03:02:12 localhost certmonger[39210]: PtKh1ZascVgBX/PspgtMm9CrJNvCW+k5y5bPI1l6Wuf6SnZR29j76c/r8VuD4DCK Dec 3 03:02:12 localhost certmonger[39210]: z6lxmBO0xQmahQIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 03:02:12 localhost certmonger[39210]: ADAAMwAwADgAMAAyADEAMTCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Dec 3 03:02:12 localhost certmonger[39210]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29v Dec 3 03:02:12 localhost certmonger[39210]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU0MzIyNS5zdG9yYWdl Dec 3 03:02:12 localhost certmonger[39210]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Dec 3 03:02:12 localhost certmonger[39210]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTQzMjI1LnN0b3JhZ2VtZ210Lm9v Dec 3 03:02:12 localhost certmonger[39210]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Dec 3 03:02:12 localhost certmonger[39210]: AjAAMB0GA1UdDgQWBBSAcOESvoINq3m0dJ0koj2pyb/7TDANBgkqhkiG9w0BAQsF Dec 3 03:02:12 localhost certmonger[39210]: AAOCAQEAKTm48jUo5O6ZbnGkUN8E1246X4BCqybxumMg4wGGq1CD5dGmDYODxSLG Dec 3 03:02:12 localhost certmonger[39210]: 9J03Xnj7fa3RhVmhrpzp3hicO2UW/t82RRIvuE/YhXk30XWtSrZBU5RuDgJnhO5S Dec 3 03:02:12 localhost certmonger[39210]: d34uxLjH5i9FOfA7CNwW+zoxAhtzlDD03tWpd6rWgfpLfl7up7JFqOLZ7iFnMFBX Dec 3 03:02:12 localhost certmonger[39210]: V3mdp06wkLjsTrv9MCrqejTp9P2KfUr2x2FnaWv2F61/fJNp69EKSA/XoGqo73lI Dec 3 03:02:12 localhost certmonger[39210]: pfaHHX0OImu1JQX8Wstx451cLTMPrjHMc8zv8XvyIMMqNxawyo39C5bMNEaA3J7X Dec 3 03:02:12 localhost certmonger[39210]: lI+QA0wjwhQVbgP0c45+xb9AI6Ka4A== Dec 3 03:02:12 localhost certmonger[39210]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:12 localhost certmonger[39210]: " for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCwFKf48wvHybQOqp1a5lwmnhgiL1JH0+wfDlrIIsI2hxrVkeQcW1l8vA1UDqlQOsnAF1RZfNF3ViwSiKY7xz/0F1o9k3Wg6pNhS3geyqryvCHg1CsIgL5s6bKfWqRvms68IhH1OoIEvIvJfqDlKcfiXXIX5pkv6+eKJf+1lL+UsxBn9mdmuJ/YDxK16jDXCcrpcnj6MuIKuuW4fsEA2RaXGl6E9Tjte6NiQp2twTpqzv3IF6GTID5qFdyeYcHHgY3NwLGSXyI+0qHVlqxxWAFf8+ymC0yb0Ksk28Jb6TnLls8jWXpa5/pKdlHb2Pvpz+vxW4PgMIrPqXGYE7TFCZqFAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAHDj+9SjbT4xzbPA3mk/XgsqJdtsjC0xKKD6bwdxlTWnV3MsaMXckP1OMHltKzDmHanEbNSOR+hnQLTbHbWIGffpwtkmqtvH96w2vVBHeRVRCLKOltvvOZpNdneZSfblPow76U4j5sTUOK/+j2HXQh8mZyVHf4FtKiyVmoSKnVyALtEwSGWgsPz0qU4c9bD9Q4A/hjctKBiaTqn3Ky68KAWbhbTEAvgNuufaeO0OaBjLgZEbe/Hc7CtD0fMvucNXkM7RbjGL1rQCirnNdEqkz7uyhCRtbUh0I5TFiJ6bdRUdyTU/ZPKDXOXA4sX8nubL/L5X1qofBggVAHVEersQB3A==" for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsBSn+PMLx8m0DqqdWuZcJp4YIi9SR9PsHw5ayCLCNoca1ZHkHFtZfLwNVA6pUDrJwBdUWXzRd1YsEoimO8c/9BdaPZN1oOqTYUt4Hsqq8rwh4NQrCIC+bOmyn1qkb5rOvCIR9TqCBLyLyX6g5SnH4l1yF+aZL+vniiX/tZS/lLMQZ/ZnZrif2A8Steow1wnK6XJ4+jLiCrrluH7BANkWlxpehPU47XujYkKdrcE6as79yBehkyA+ahXcnmHBx4GNzcCxkl8iPtKh1ZascVgBX/PspgtMm9CrJNvCW+k5y5bPI1l6Wuf6SnZR29j76c/r8VuD4DCKz6lxmBO0xQmahQIDAQAB" for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:12 localhost certmonger[39210]: 2025-12-03 08:02:11 [39210] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:11 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39210]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost certmonger[39210]: Certificate: "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" Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Certificate submission still ongoing. Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Certificate submission attempt complete. Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Child status = 0. Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Child output: Dec 3 03:02:12 localhost certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[38530]: MIIFVTCCA72gAwIBAgIBFTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:12 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:12 localhost certmonger[38530]: MDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:12 localhost certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:12 localhost certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBALAUp/jzC8fJtA6qnVrmXCaeGCIvUkfT7B8O Dec 3 03:02:12 localhost certmonger[38530]: WsgiwjaHGtWR5BxbWXy8DVQOqVA6ycAXVFl80XdWLBKIpjvHP/QXWj2TdaDqk2FL Dec 3 03:02:12 localhost certmonger[38530]: eB7KqvK8IeDUKwiAvmzpsp9apG+azrwiEfU6ggS8i8l+oOUpx+JdchfmmS/r54ol Dec 3 03:02:12 localhost certmonger[38530]: /7WUv5SzEGf2Z2a4n9gPErXqMNcJyulyePoy4gq65bh+wQDZFpcaXoT1OO17o2JC Dec 3 03:02:12 localhost certmonger[38530]: na3BOmrO/cgXoZMgPmoV3J5hwceBjc3AsZJfIj7SodWWrHFYAV/z7KYLTJvQqyTb Dec 3 03:02:12 localhost certmonger[38530]: wlvpOcuWzyNZelrn+kp2UdvY++nP6/Fbg+Awis+pcZgTtMUJmoUCAwEAAaOCAeYw Dec 3 03:02:12 localhost certmonger[38530]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:12 localhost certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:12 localhost certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:12 localhost certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:12 localhost certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:12 localhost certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFadhpyd/KPp1F5DJXlpeF9Z Dec 3 03:02:12 localhost certmonger[38530]: isYyMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28u Dec 3 03:02:12 localhost certmonger[38530]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI1LnN0b3JhZ2Vt Dec 3 03:02:12 localhost certmonger[38530]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:12 localhost certmonger[38530]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29v Dec 3 03:02:12 localhost certmonger[38530]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAB7hem2sxZOtaC0Jub22Pr8al2i/oJ0f Dec 3 03:02:12 localhost certmonger[38530]: zm1FuxzTT9bVAS148v2H+ZsjNHg9BjRAdtfoupy/bWO2zwQpv569L4B+0xuFFOvD Dec 3 03:02:12 localhost certmonger[38530]: y7gkjSv4qzpFLDaItmXEzKs7icf/AEmfRc4U1Yhgq9ySg/Z2a1Wos0upWlDX99u6 Dec 3 03:02:12 localhost certmonger[38530]: kAHLcKhxgw9P1gCZ242cbIap2UKmLZV4VIBLopZKQA6bP+PHnhW/pdsBptwIITpA Dec 3 03:02:12 localhost certmonger[38530]: VRld40qoX0kSOAYftTHqqlZ+RkpCDunTVZyOqNRomHiwD6dwvGZy2VI+ueGiwdK2 Dec 3 03:02:12 localhost certmonger[38530]: ImOXklm3h8cvtR4GaB1mjhr+Zdtk9tU7dtYMOuBhmod+mTrXkd4wsaPt7SA7DmNC Dec 3 03:02:12 localhost certmonger[38530]: HJVeWpan2efWjVvXhSy6eg7NBE3cBuVWxaVTvCbi2n6chs1+LXKsOuAIJGtRavp/ Dec 3 03:02:12 localhost certmonger[38530]: 2fDMuN5IerHgChxdAA4tsCZvqD+bUctrFhNuVgsbdO6xcs8wprP9ZukZH9a028wc Dec 3 03:02:12 localhost certmonger[38530]: D/PcVubRFrcZHmslMd0q6qyRZCK5iMSoNg== Dec 3 03:02:12 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[38530]: " Dec 3 03:02:12 localhost certmonger[39212]: 2025-12-03 08:02:12 [39212] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39212]: MIIFVTCCA72gAwIBAgIBFTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:12 localhost certmonger[39212]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:12 localhost certmonger[39212]: MDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:12 localhost certmonger[39212]: BAMMIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:12 localhost certmonger[39212]: hvcNAQEBBQADggEPADCCAQoCggEBALAUp/jzC8fJtA6qnVrmXCaeGCIvUkfT7B8O Dec 3 03:02:12 localhost certmonger[39212]: WsgiwjaHGtWR5BxbWXy8DVQOqVA6ycAXVFl80XdWLBKIpjvHP/QXWj2TdaDqk2FL Dec 3 03:02:12 localhost certmonger[39212]: eB7KqvK8IeDUKwiAvmzpsp9apG+azrwiEfU6ggS8i8l+oOUpx+JdchfmmS/r54ol Dec 3 03:02:12 localhost certmonger[39212]: /7WUv5SzEGf2Z2a4n9gPErXqMNcJyulyePoy4gq65bh+wQDZFpcaXoT1OO17o2JC Dec 3 03:02:12 localhost certmonger[39212]: na3BOmrO/cgXoZMgPmoV3J5hwceBjc3AsZJfIj7SodWWrHFYAV/z7KYLTJvQqyTb Dec 3 03:02:12 localhost certmonger[39212]: wlvpOcuWzyNZelrn+kp2UdvY++nP6/Fbg+Awis+pcZgTtMUJmoUCAwEAAaOCAeYw Dec 3 03:02:12 localhost certmonger[39212]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:12 localhost certmonger[39212]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:12 localhost certmonger[39212]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:12 localhost certmonger[39212]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:12 localhost certmonger[39212]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:12 localhost certmonger[39212]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFadhpyd/KPp1F5DJXlpeF9Z Dec 3 03:02:12 localhost certmonger[39212]: isYyMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28u Dec 3 03:02:12 localhost certmonger[39212]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI1LnN0b3JhZ2Vt Dec 3 03:02:12 localhost certmonger[39212]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:12 localhost certmonger[39212]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29v Dec 3 03:02:12 localhost certmonger[39212]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAB7hem2sxZOtaC0Jub22Pr8al2i/oJ0f Dec 3 03:02:12 localhost certmonger[39212]: zm1FuxzTT9bVAS148v2H+ZsjNHg9BjRAdtfoupy/bWO2zwQpv569L4B+0xuFFOvD Dec 3 03:02:12 localhost certmonger[39212]: y7gkjSv4qzpFLDaItmXEzKs7icf/AEmfRc4U1Yhgq9ySg/Z2a1Wos0upWlDX99u6 Dec 3 03:02:12 localhost certmonger[39212]: kAHLcKhxgw9P1gCZ242cbIap2UKmLZV4VIBLopZKQA6bP+PHnhW/pdsBptwIITpA Dec 3 03:02:12 localhost certmonger[39212]: VRld40qoX0kSOAYftTHqqlZ+RkpCDunTVZyOqNRomHiwD6dwvGZy2VI+ueGiwdK2 Dec 3 03:02:12 localhost certmonger[39212]: ImOXklm3h8cvtR4GaB1mjhr+Zdtk9tU7dtYMOuBhmod+mTrXkd4wsaPt7SA7DmNC Dec 3 03:02:12 localhost certmonger[39212]: HJVeWpan2efWjVvXhSy6eg7NBE3cBuVWxaVTvCbi2n6chs1+LXKsOuAIJGtRavp/ Dec 3 03:02:12 localhost certmonger[39212]: 2fDMuN5IerHgChxdAA4tsCZvqD+bUctrFhNuVgsbdO6xcs8wprP9ZukZH9a028wc Dec 3 03:02:12 localhost certmonger[39212]: D/PcVubRFrcZHmslMd0q6qyRZCK5iMSoNg== Dec 3 03:02:12 localhost certmonger[39212]: -----END CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39212]: ". Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Certificate submission still ongoing. Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Certificate submission postprocessing complete. Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Child status = 0. Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Child output: Dec 3 03:02:12 localhost certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFVTCCA72gAwIBAgIBFTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4\nMDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBALAUp/jzC8fJtA6qnVrmXCaeGCIvUkfT7B8O\nWsgiwjaHGtWR5BxbWXy8DVQOqVA6ycAXVFl80XdWLBKIpjvHP/QXWj2TdaDqk2FL\neB7KqvK8IeDUKwiAvmzpsp9apG+azrwiEfU6ggS8i8l+oOUpx+JdchfmmS/r54ol\n/7WUv5SzEGf2Z2a4n9gPErXqMNcJyulyePoy4gq65bh+wQDZFpcaXoT1OO17o2JC\nna3BOmrO/cgXoZMgPmoV3J5hwceBjc3AsZJfIj7SodWWrHFYAV/z7KYLTJvQqyTb\nwlvpOcuWzyNZelrn+kp2UdvY++nP6/Fbg+Awis+pcZgTtMUJmoUCAwEAAaOCAeYw\nggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFadhpyd/KPp1F5DJXlpeF9Z\nisYyMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28u\ndGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI1LnN0b3JhZ2Vt\nZ210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh\nNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29v\nLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAB7hem2sxZOtaC0Jub22Pr8al2i/oJ0f\nzm1FuxzTT9bVAS148v2H+ZsjNHg9BjRAdtfoupy/bWO2zwQpv569L4B+0xuFFOvD\ny7gkjSv4qzpFLDaItmXEzKs7icf/AEmfRc4U1Yhgq9ySg/Z2a1Wos0upWlDX99u6\nkAHLcKhxgw9P1gCZ242cbIap2UKmLZV4VIBLopZKQA6bP+PHnhW/pdsBptwIITpA\nVRld40qoX0kSOAYftTHqqlZ+RkpCDunTVZyOqNRomHiwD6dwvGZy2VI+ueGiwdK2\nImOXklm3h8cvtR4GaB1mjhr+Zdtk9tU7dtYMOuBhmod+mTrXkd4wsaPt7SA7DmNC\nHJVeWpan2efWjVvXhSy6eg7NBE3cBuVWxaVTvCbi2n6chs1+LXKsOuAIJGtRavp/\n2fDMuN5IerHgChxdAA4tsCZvqD+bUctrFhNuVgsbdO6xcs8wprP9ZukZH9a028wc\nD/PcVubRFrcZHmslMd0q6qyRZCK5iMSoNg==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:12 localhost certmonger[38530]: " Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[38530]: MIIFVTCCA72gAwIBAgIBFTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:12 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:12 localhost certmonger[38530]: MDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:12 localhost certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:12 localhost certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBALAUp/jzC8fJtA6qnVrmXCaeGCIvUkfT7B8O Dec 3 03:02:12 localhost certmonger[38530]: WsgiwjaHGtWR5BxbWXy8DVQOqVA6ycAXVFl80XdWLBKIpjvHP/QXWj2TdaDqk2FL Dec 3 03:02:12 localhost certmonger[38530]: eB7KqvK8IeDUKwiAvmzpsp9apG+azrwiEfU6ggS8i8l+oOUpx+JdchfmmS/r54ol Dec 3 03:02:12 localhost certmonger[38530]: /7WUv5SzEGf2Z2a4n9gPErXqMNcJyulyePoy4gq65bh+wQDZFpcaXoT1OO17o2JC Dec 3 03:02:12 localhost certmonger[38530]: na3BOmrO/cgXoZMgPmoV3J5hwceBjc3AsZJfIj7SodWWrHFYAV/z7KYLTJvQqyTb Dec 3 03:02:12 localhost certmonger[38530]: wlvpOcuWzyNZelrn+kp2UdvY++nP6/Fbg+Awis+pcZgTtMUJmoUCAwEAAaOCAeYw Dec 3 03:02:12 localhost certmonger[38530]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:12 localhost certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:12 localhost certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:12 localhost certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:12 localhost certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:12 localhost certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFadhpyd/KPp1F5DJXlpeF9Z Dec 3 03:02:12 localhost certmonger[38530]: isYyMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28u Dec 3 03:02:12 localhost certmonger[38530]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI1LnN0b3JhZ2Vt Dec 3 03:02:12 localhost certmonger[38530]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:12 localhost certmonger[38530]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29v Dec 3 03:02:12 localhost certmonger[38530]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAB7hem2sxZOtaC0Jub22Pr8al2i/oJ0f Dec 3 03:02:12 localhost certmonger[38530]: zm1FuxzTT9bVAS148v2H+ZsjNHg9BjRAdtfoupy/bWO2zwQpv569L4B+0xuFFOvD Dec 3 03:02:12 localhost certmonger[38530]: y7gkjSv4qzpFLDaItmXEzKs7icf/AEmfRc4U1Yhgq9ySg/Z2a1Wos0upWlDX99u6 Dec 3 03:02:12 localhost certmonger[38530]: kAHLcKhxgw9P1gCZ242cbIap2UKmLZV4VIBLopZKQA6bP+PHnhW/pdsBptwIITpA Dec 3 03:02:12 localhost certmonger[38530]: VRld40qoX0kSOAYftTHqqlZ+RkpCDunTVZyOqNRomHiwD6dwvGZy2VI+ueGiwdK2 Dec 3 03:02:12 localhost certmonger[38530]: ImOXklm3h8cvtR4GaB1mjhr+Zdtk9tU7dtYMOuBhmod+mTrXkd4wsaPt7SA7DmNC Dec 3 03:02:12 localhost certmonger[38530]: HJVeWpan2efWjVvXhSy6eg7NBE3cBuVWxaVTvCbi2n6chs1+LXKsOuAIJGtRavp/ Dec 3 03:02:12 localhost certmonger[38530]: 2fDMuN5IerHgChxdAA4tsCZvqD+bUctrFhNuVgsbdO6xcs8wprP9ZukZH9a028wc Dec 3 03:02:12 localhost certmonger[38530]: D/PcVubRFrcZHmslMd0q6qyRZCK5iMSoNg== Dec 3 03:02:12 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[38530]: ". Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] No hooks set for pre-save command. Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39220]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost python3[39236]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005543225.internalapi.ooo.test'] principal=['HTTP/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:12 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:12 localhost certmonger[38530]: 2025-12-03 08:02:12 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 03:02:13 localhost certmonger[39246]: " for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 03:02:13 localhost certmonger[39246]: " for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:13 localhost certmonger[39246]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 03:02:13 localhost certmonger[39246]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA26tWVYpI Dec 3 03:02:13 localhost certmonger[39246]: 1J2xhwCdWHeo3OdhNsABwJzRvbx3QsPgEVZjz2AYZCFFNgW1pgqsTAKvzMOGc9+o Dec 3 03:02:13 localhost certmonger[39246]: dvDQV0+uUrg1gCNX6qMkZm16NiPWR30LjT+o+I56rxWJ3q4DVHLDkxCs7d5EaO7S Dec 3 03:02:13 localhost certmonger[39246]: gYhYZxpra41hBRFk/e3b5APYJo69JW5oXSobbCi7VC5ue6zSxpFNA+5IXL0Fw1SJ Dec 3 03:02:13 localhost certmonger[39246]: mFOKNoPF5ANIUUODd5WKr8Y8mIY9dpyRVB0UT+/KhtqbFbewF6cuer6jPEG0WHjM Dec 3 03:02:13 localhost certmonger[39246]: LI9NLycJBfGoUlzBut+Vbw0Sj3sE3eZxGAZirXtQAsKTabIh8+rimMEWmlmsexop Dec 3 03:02:13 localhost certmonger[39246]: hCaS9XRjFGo+NwIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 03:02:13 localhost certmonger[39246]: ADAAMwAwADgAMAAyADEAMjCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Dec 3 03:02:13 localhost certmonger[39246]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 03:02:13 localhost certmonger[39246]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU0MzIyNS5pbnRlcm5h Dec 3 03:02:13 localhost certmonger[39246]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Dec 3 03:02:13 localhost certmonger[39246]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9v Dec 3 03:02:13 localhost certmonger[39246]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Dec 3 03:02:13 localhost certmonger[39246]: AjAAMB0GA1UdDgQWBBSJ9aS3hsYX8r1WHajTktSWqqU6PzANBgkqhkiG9w0BAQsF Dec 3 03:02:13 localhost certmonger[39246]: AAOCAQEAC7OO351q72WPMVWYosryRBeAij5296HnY8ViqLiOd15F5l9I0EAe5nFh Dec 3 03:02:13 localhost certmonger[39246]: NxGin4XCMhtGQPu4q/QTpwBofxepouAIJVlgpLY+a8CU78HPVIw6W/tSs7ZsC55n Dec 3 03:02:13 localhost certmonger[39246]: m3RLECFc/QlsCc3DM37ar1vzBa8gNUbFtdwRG2fpZ+4BZdKshh8wXFDK8J18FrBX Dec 3 03:02:13 localhost certmonger[39246]: ZU0NmZ3OSUx/CRiq6lCZ2pErTJg/5E7A6YMHdVJa7lTebiH++ZfgUXhInQI3M04g Dec 3 03:02:13 localhost certmonger[39246]: 0ZogK5wxrBnN128mFVaZ3fjZFa/LCfWCgSFKvUCsQmicfpaflY28RiF+YnVTyUIk Dec 3 03:02:13 localhost certmonger[39246]: nAuyaijqOhUU0LR1DPPrRyhzvlPF0w== Dec 3 03:02:13 localhost certmonger[39246]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:13 localhost certmonger[39246]: " for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA26tWVYpI1J2xhwCdWHeo3OdhNsABwJzRvbx3QsPgEVZjz2AYZCFFNgW1pgqsTAKvzMOGc9+odvDQV0+uUrg1gCNX6qMkZm16NiPWR30LjT+o+I56rxWJ3q4DVHLDkxCs7d5EaO7SgYhYZxpra41hBRFk/e3b5APYJo69JW5oXSobbCi7VC5ue6zSxpFNA+5IXL0Fw1SJmFOKNoPF5ANIUUODd5WKr8Y8mIY9dpyRVB0UT+/KhtqbFbewF6cuer6jPEG0WHjMLI9NLycJBfGoUlzBut+Vbw0Sj3sE3eZxGAZirXtQAsKTabIh8+rimMEWmlmsexophCaS9XRjFGo+NwIDAQAB" for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:13 localhost certmonger[39246]: 2025-12-03 08:02:13 [39246] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[39246]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[39246]: Certificate: "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" Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Certificate submission still ongoing. Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Certificate submission attempt complete. Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Child status = 0. Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Child output: Dec 3 03:02:13 localhost certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[38530]: MIIFVTCCA72gAwIBAgIBGDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:13 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:13 localhost certmonger[38530]: MDIxM1oXDTI3MTIwNDA4MDIxM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:13 localhost certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:13 localhost certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBANurVlWKSNSdsYcAnVh3qNznYTbAAcCc0b28 Dec 3 03:02:13 localhost certmonger[38530]: d0LD4BFWY89gGGQhRTYFtaYKrEwCr8zDhnPfqHbw0FdPrlK4NYAjV+qjJGZtejYj Dec 3 03:02:13 localhost certmonger[38530]: 1kd9C40/qPiOeq8Vid6uA1Ryw5MQrO3eRGju0oGIWGcaa2uNYQURZP3t2+QD2CaO Dec 3 03:02:13 localhost certmonger[38530]: vSVuaF0qG2wou1Qubnus0saRTQPuSFy9BcNUiZhTijaDxeQDSFFDg3eViq/GPJiG Dec 3 03:02:13 localhost certmonger[38530]: PXackVQdFE/vyobamxW3sBenLnq+ozxBtFh4zCyPTS8nCQXxqFJcwbrflW8NEo97 Dec 3 03:02:13 localhost certmonger[38530]: BN3mcRgGYq17UALCk2myIfPq4pjBFppZrHsaKYQmkvV0YxRqPjcCAwEAAaOCAeYw Dec 3 03:02:13 localhost certmonger[38530]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:13 localhost certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:13 localhost certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:13 localhost certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:13 localhost certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:13 localhost certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEoWAgQe8s3C//xS9gfwOdCH Dec 3 03:02:13 localhost certmonger[38530]: QHgxMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 03:02:13 localhost certmonger[38530]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI1LmludGVybmFs Dec 3 03:02:13 localhost certmonger[38530]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:13 localhost certmonger[38530]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 03:02:13 localhost certmonger[38530]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAKOX+26urpBcmlxGxB5PVvo9qzUYNNHr Dec 3 03:02:13 localhost certmonger[38530]: JUOpliWUOfmc0/p9ELLrMFd152c2nDaJOLFZjlA9zd9fLn2jcB7ybioMpFq1lIEg Dec 3 03:02:13 localhost certmonger[38530]: GUv3mRUiXP6uVRT4kIf+NQ1FDoYskR8EsONndCjJi+hK26/TL6W8t3lYGwefHICK Dec 3 03:02:13 localhost certmonger[38530]: eR/nZDLTyJMPZCS8kFmJDN01yhu2cSZBmUbboHWoOZm/P/0Wgbjh3Cxvi5YkHeye Dec 3 03:02:13 localhost certmonger[38530]: 7Stc1PppFdUjpLt6QLoh50bcDqYI/CbxREcBsfH0zQh9lGgbhiikKbepVcR67JHY Dec 3 03:02:13 localhost certmonger[38530]: wYhHvgWqDvv60eCXYCJrp1bxy+t3EwTZcgYTTOyyMh6PYM1UC+9Hg/pu4TMj3ZRu Dec 3 03:02:13 localhost certmonger[38530]: XO1Ee8T7UJYfvL0rlb2O9T3P1goJYTYPIT/ASadxCsnucADyGOa2FjDDgOlcLcAE Dec 3 03:02:13 localhost certmonger[38530]: 6A9Dr3GmzESGfT2dBH/yECcBRSrBxhN9te2E964seEGda3W8e9UPQWZECgTNPPvw Dec 3 03:02:13 localhost certmonger[38530]: CInz6tHrWfCsmMnyjQSfZWD6JnBm3oy5oA== Dec 3 03:02:13 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[38530]: " Dec 3 03:02:13 localhost certmonger[39248]: 2025-12-03 08:02:13 [39248] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39248]: MIIFVTCCA72gAwIBAgIBGDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:13 localhost certmonger[39248]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:13 localhost certmonger[39248]: MDIxM1oXDTI3MTIwNDA4MDIxM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:13 localhost certmonger[39248]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:13 localhost certmonger[39248]: hvcNAQEBBQADggEPADCCAQoCggEBANurVlWKSNSdsYcAnVh3qNznYTbAAcCc0b28 Dec 3 03:02:13 localhost certmonger[39248]: d0LD4BFWY89gGGQhRTYFtaYKrEwCr8zDhnPfqHbw0FdPrlK4NYAjV+qjJGZtejYj Dec 3 03:02:13 localhost certmonger[39248]: 1kd9C40/qPiOeq8Vid6uA1Ryw5MQrO3eRGju0oGIWGcaa2uNYQURZP3t2+QD2CaO Dec 3 03:02:13 localhost certmonger[39248]: vSVuaF0qG2wou1Qubnus0saRTQPuSFy9BcNUiZhTijaDxeQDSFFDg3eViq/GPJiG Dec 3 03:02:13 localhost certmonger[39248]: PXackVQdFE/vyobamxW3sBenLnq+ozxBtFh4zCyPTS8nCQXxqFJcwbrflW8NEo97 Dec 3 03:02:13 localhost certmonger[39248]: BN3mcRgGYq17UALCk2myIfPq4pjBFppZrHsaKYQmkvV0YxRqPjcCAwEAAaOCAeYw Dec 3 03:02:13 localhost certmonger[39248]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:13 localhost certmonger[39248]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:13 localhost certmonger[39248]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:13 localhost certmonger[39248]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:13 localhost certmonger[39248]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:13 localhost certmonger[39248]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEoWAgQe8s3C//xS9gfwOdCH Dec 3 03:02:13 localhost certmonger[39248]: QHgxMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 03:02:13 localhost certmonger[39248]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI1LmludGVybmFs Dec 3 03:02:13 localhost certmonger[39248]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:13 localhost certmonger[39248]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 03:02:13 localhost certmonger[39248]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAKOX+26urpBcmlxGxB5PVvo9qzUYNNHr Dec 3 03:02:13 localhost certmonger[39248]: JUOpliWUOfmc0/p9ELLrMFd152c2nDaJOLFZjlA9zd9fLn2jcB7ybioMpFq1lIEg Dec 3 03:02:13 localhost certmonger[39248]: GUv3mRUiXP6uVRT4kIf+NQ1FDoYskR8EsONndCjJi+hK26/TL6W8t3lYGwefHICK Dec 3 03:02:13 localhost certmonger[39248]: eR/nZDLTyJMPZCS8kFmJDN01yhu2cSZBmUbboHWoOZm/P/0Wgbjh3Cxvi5YkHeye Dec 3 03:02:13 localhost certmonger[39248]: 7Stc1PppFdUjpLt6QLoh50bcDqYI/CbxREcBsfH0zQh9lGgbhiikKbepVcR67JHY Dec 3 03:02:13 localhost certmonger[39248]: wYhHvgWqDvv60eCXYCJrp1bxy+t3EwTZcgYTTOyyMh6PYM1UC+9Hg/pu4TMj3ZRu Dec 3 03:02:13 localhost certmonger[39248]: XO1Ee8T7UJYfvL0rlb2O9T3P1goJYTYPIT/ASadxCsnucADyGOa2FjDDgOlcLcAE Dec 3 03:02:13 localhost certmonger[39248]: 6A9Dr3GmzESGfT2dBH/yECcBRSrBxhN9te2E964seEGda3W8e9UPQWZECgTNPPvw Dec 3 03:02:13 localhost certmonger[39248]: CInz6tHrWfCsmMnyjQSfZWD6JnBm3oy5oA== Dec 3 03:02:13 localhost certmonger[39248]: -----END CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39248]: ". Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Certificate submission still ongoing. Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Certificate submission postprocessing complete. Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Child status = 0. Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Child output: Dec 3 03:02:13 localhost certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nCInz6tHrWfCsmMnyjQSfZWD6JnBm3oy5oA==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:13 localhost certmonger[38530]: " Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[38530]: MIIFVTCCA72gAwIBAgIBGDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:13 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:13 localhost certmonger[38530]: MDIxM1oXDTI3MTIwNDA4MDIxM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:13 localhost certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:13 localhost certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBANurVlWKSNSdsYcAnVh3qNznYTbAAcCc0b28 Dec 3 03:02:13 localhost certmonger[38530]: d0LD4BFWY89gGGQhRTYFtaYKrEwCr8zDhnPfqHbw0FdPrlK4NYAjV+qjJGZtejYj Dec 3 03:02:13 localhost certmonger[38530]: 1kd9C40/qPiOeq8Vid6uA1Ryw5MQrO3eRGju0oGIWGcaa2uNYQURZP3t2+QD2CaO Dec 3 03:02:13 localhost certmonger[38530]: vSVuaF0qG2wou1Qubnus0saRTQPuSFy9BcNUiZhTijaDxeQDSFFDg3eViq/GPJiG Dec 3 03:02:13 localhost certmonger[38530]: PXackVQdFE/vyobamxW3sBenLnq+ozxBtFh4zCyPTS8nCQXxqFJcwbrflW8NEo97 Dec 3 03:02:13 localhost certmonger[38530]: BN3mcRgGYq17UALCk2myIfPq4pjBFppZrHsaKYQmkvV0YxRqPjcCAwEAAaOCAeYw Dec 3 03:02:13 localhost certmonger[38530]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:13 localhost certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:13 localhost certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:13 localhost certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:13 localhost certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:13 localhost certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEoWAgQe8s3C//xS9gfwOdCH Dec 3 03:02:13 localhost certmonger[38530]: QHgxMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 03:02:13 localhost certmonger[38530]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI1LmludGVybmFs Dec 3 03:02:13 localhost certmonger[38530]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:13 localhost certmonger[38530]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 03:02:13 localhost certmonger[38530]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAKOX+26urpBcmlxGxB5PVvo9qzUYNNHr Dec 3 03:02:13 localhost certmonger[38530]: JUOpliWUOfmc0/p9ELLrMFd152c2nDaJOLFZjlA9zd9fLn2jcB7ybioMpFq1lIEg Dec 3 03:02:13 localhost certmonger[38530]: GUv3mRUiXP6uVRT4kIf+NQ1FDoYskR8EsONndCjJi+hK26/TL6W8t3lYGwefHICK Dec 3 03:02:13 localhost certmonger[38530]: eR/nZDLTyJMPZCS8kFmJDN01yhu2cSZBmUbboHWoOZm/P/0Wgbjh3Cxvi5YkHeye Dec 3 03:02:13 localhost certmonger[38530]: 7Stc1PppFdUjpLt6QLoh50bcDqYI/CbxREcBsfH0zQh9lGgbhiikKbepVcR67JHY Dec 3 03:02:13 localhost certmonger[38530]: wYhHvgWqDvv60eCXYCJrp1bxy+t3EwTZcgYTTOyyMh6PYM1UC+9Hg/pu4TMj3ZRu Dec 3 03:02:13 localhost certmonger[38530]: XO1Ee8T7UJYfvL0rlb2O9T3P1goJYTYPIT/ASadxCsnucADyGOa2FjDDgOlcLcAE Dec 3 03:02:13 localhost certmonger[38530]: 6A9Dr3GmzESGfT2dBH/yECcBRSrBxhN9te2E964seEGda3W8e9UPQWZECgTNPPvw Dec 3 03:02:13 localhost certmonger[38530]: CInz6tHrWfCsmMnyjQSfZWD6JnBm3oy5oA== Dec 3 03:02:13 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[38530]: ". Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] No hooks set for pre-save command. Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost certmonger[39256]: Certificate in file "/etc/pki/tls/certs/httpd-internal_api.crt" issued by CA and saved. Dec 3 03:02:13 localhost certmonger[38530]: 2025-12-03 08:02:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080212 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:13 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost python3[39272]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005543225.external.ooo.test'] principal=['HTTP/np0005543225.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost sedispatch[723]: AVC Message regarding setroubleshoot, ignoring message Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.external.ooo.test" for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.external.ooo.test Dec 3 03:02:14 localhost certmonger[39282]: " for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543225.external.ooo.test@OOO.TEST Dec 3 03:02:14 localhost certmonger[39282]: " for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:14 localhost certmonger[39282]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTQzMjI1LmV4dGVybmFsLm9v Dec 3 03:02:14 localhost certmonger[39282]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA18ubrihsOgVJ Dec 3 03:02:14 localhost certmonger[39282]: XmZCMSowLp7PwkowWAv1e5K/GGA3i98xGUdS6ihAG+NKgUpfY8u/NZ34Jaldp3S0 Dec 3 03:02:14 localhost certmonger[39282]: HFQhJH9WMF3J/3xTZ4FcQ5VCoyJK5C5YtDC+DyN2F2GO9+9aW0IGju1tXffp2TH/ Dec 3 03:02:14 localhost certmonger[39282]: GQHDi1G1/I0G8alLnvnPGQIaSQ7Z5HQvfzm0KjH2b1MQJkcXRm1LfQdwPfEcT6kH Dec 3 03:02:14 localhost certmonger[39282]: JyyU8nFZmC2ANputdBrD8gXkSgARjc+io9I9e4zWKlsk9x9KWFljN0MnlD1q+7DH Dec 3 03:02:14 localhost certmonger[39282]: MueDTSBB1SSBEfoAm7aN6IgGvSVtvY4H8tvqhvvKUu4/YnW3WBLPkv3wmBjQdDDY Dec 3 03:02:14 localhost certmonger[39282]: UC6HGy+IVwIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAA Dec 3 03:02:14 localhost certmonger[39282]: MwAwADgAMAAyADEANDCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Dec 3 03:02:14 localhost certmonger[39282]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1NDMyMjUuZXh0ZXJuYWwub29vLnRlc3Sg Dec 3 03:02:14 localhost certmonger[39282]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU0MzIyNS5leHRlcm5hbC5vb28u Dec 3 03:02:14 localhost certmonger[39282]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Dec 3 03:02:14 localhost certmonger[39282]: oSgwJhsESFRUUBsebnAwMDA1NTQzMjI1LmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Dec 3 03:02:14 localhost certmonger[39282]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Dec 3 03:02:14 localhost certmonger[39282]: BBTwahwbi4DI5tcbjomU4cMRkfcFDTANBgkqhkiG9w0BAQsFAAOCAQEANSJ8u+sJ Dec 3 03:02:14 localhost certmonger[39282]: qBuU9ebT43Z08AvXfKRtF/UAhtXiPpgADWOCatzZ6bPh6Cc9I1+W4dPoNEltYEIW Dec 3 03:02:14 localhost certmonger[39282]: DXKvaZQQC+yoaLjos/VBm7XxNA1GN4TLJhxe3QnTU9lvsXHcAe4WGiA+8/RjoREL Dec 3 03:02:14 localhost certmonger[39282]: vpzsLLOOQu0Yec/ubheijtcUd2d/3+dO2gUa5CjHILqpOlP0YDmgp2qUswuH2NTy Dec 3 03:02:14 localhost certmonger[39282]: +Pnz3GqMSeBUW+UZpoPvDqpJefyDPNV0LGS3RYeSqopRrDXkPGocHg76PET7ecjO Dec 3 03:02:14 localhost certmonger[39282]: eEddxKo/9o5pqcJVJtl1GlFoUyVsXSEIGAsdSd8axcb3ldRmy1Wd/CTT2Iu1YsEL Dec 3 03:02:14 localhost certmonger[39282]: IWNRSqkUVTajTw== Dec 3 03:02:14 localhost certmonger[39282]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:14 localhost certmonger[39282]: " for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA18ubrihsOgVJXmZCMSowLp7PwkowWAv1e5K/GGA3i98xGUdS6ihAG+NKgUpfY8u/NZ34Jaldp3S0HFQhJH9WMF3J/3xTZ4FcQ5VCoyJK5C5YtDC+DyN2F2GO9+9aW0IGju1tXffp2TH/GQHDi1G1/I0G8alLnvnPGQIaSQ7Z5HQvfzm0KjH2b1MQJkcXRm1LfQdwPfEcT6kHJyyU8nFZmC2ANputdBrD8gXkSgARjc+io9I9e4zWKlsk9x9KWFljN0MnlD1q+7DHMueDTSBB1SSBEfoAm7aN6IgGvSVtvY4H8tvqhvvKUu4/YnW3WBLPkv3wmBjQdDDYUC6HGy+IVwIDAQAB" for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:14 localhost certmonger[39282]: 2025-12-03 08:02:14 [39282] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:14 localhost certmonger[38530]: 2025-12-03 08:02:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:14 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost certmonger[39282]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7058178f-62b0-47ce-876b-614ab7f7076a Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost certmonger[39282]: Certificate: "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" Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Certificate submission still ongoing. Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Certificate submission attempt complete. Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Child status = 0. Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Child output: Dec 3 03:02:15 localhost certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:15 localhost certmonger[38530]: MIIFSTCCA7GgAwIBAgIBGzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:15 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:15 localhost certmonger[38530]: MDIxNVoXDTI3MTIwNDA4MDIxNVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:15 localhost certmonger[38530]: BAMMHm5wMDAwNTU0MzIyNS5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:15 localhost certmonger[38530]: AQEBBQADggEPADCCAQoCggEBANfLm64obDoFSV5mQjEqMC6ez8JKMFgL9XuSvxhg Dec 3 03:02:15 localhost certmonger[38530]: N4vfMRlHUuooQBvjSoFKX2PLvzWd+CWpXad0tBxUISR/VjBdyf98U2eBXEOVQqMi Dec 3 03:02:15 localhost certmonger[38530]: SuQuWLQwvg8jdhdhjvfvWltCBo7tbV336dkx/xkBw4tRtfyNBvGpS575zxkCGkkO Dec 3 03:02:15 localhost certmonger[38530]: 2eR0L385tCox9m9TECZHF0ZtS30HcD3xHE+pBycslPJxWZgtgDabrXQaw/IF5EoA Dec 3 03:02:15 localhost certmonger[38530]: EY3PoqPSPXuM1ipbJPcfSlhZYzdDJ5Q9avuwxzLng00gQdUkgRH6AJu2jeiIBr0l Dec 3 03:02:15 localhost certmonger[38530]: bb2OB/Lb6ob7ylLuP2J1t1gSz5L98JgY0HQw2FAuhxsviFcCAwEAAaOCAd0wggHZ Dec 3 03:02:15 localhost certmonger[38530]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:15 localhost certmonger[38530]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:15 localhost certmonger[38530]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:15 localhost certmonger[38530]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:15 localhost certmonger[38530]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:15 localhost certmonger[38530]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBC+jZ+8EnuvdmHwpQKyRsKg8bzB Dec 3 03:02:15 localhost certmonger[38530]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNS5leHRlcm5hbC5vb28udGVzdKA8 Dec 3 03:02:15 localhost certmonger[38530]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI1LmV4dGVybmFsLm9vby50 Dec 3 03:02:15 localhost certmonger[38530]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:15 localhost certmonger[38530]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjUuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Dec 3 03:02:15 localhost certmonger[38530]: hvcNAQELBQADggGBAKCT0eWABZibM/Llc17XUSK7tTv6tH+bQszzZJjW1NgJNsw3 Dec 3 03:02:15 localhost certmonger[38530]: hwXEBJy+XhhhNGmf+lAwWhmCtdtC8p/9AR7SsKbvTxOATb3s8GYdiDmUS7Pne2PL Dec 3 03:02:15 localhost certmonger[38530]: vTCzLFjfTx2sVr3Ghkuoaowg2rT8hJZREBnez6GdBOhbGKJwmlvfT6RgsGsoUz2l Dec 3 03:02:15 localhost certmonger[38530]: XK1p7UEVfrd94tAik8mbft5Tkh+bUTD6WoDR0zP6UMceZDNKo3mwIj3zpXtMtyL+ Dec 3 03:02:15 localhost certmonger[38530]: FRcb3R9b0sgN6pRQow/VauPmz6kdjPFaf3mrcmW7YZ2Y/llepDj4uVdBMBgGRXPN Dec 3 03:02:15 localhost certmonger[38530]: tfUz4RPygCSvf9KeoFsI4bb+Znr6oDx/KN946Ku22VK8QMlDZIJI8AHd+irHK4dj Dec 3 03:02:15 localhost certmonger[38530]: 3URf3AeeEdfmUbaNhn1C4nfTz5oskRrqvriMdUboqIbIczSPssSsEbiMrj7d3ObO Dec 3 03:02:15 localhost certmonger[38530]: FA/Ftu9QtniSTDoCJ8JS0KREAN4S9sNFxzw7XVSgHszL0FWMbZj+zMZVz+Q42av9 Dec 3 03:02:15 localhost certmonger[38530]: nz8eGHxNMBOSfPYtCQ== Dec 3 03:02:15 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:15 localhost certmonger[38530]: " Dec 3 03:02:15 localhost certmonger[39284]: 2025-12-03 08:02:15 [39284] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:15 localhost certmonger[39284]: MIIFSTCCA7GgAwIBAgIBGzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:15 localhost certmonger[39284]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:15 localhost certmonger[39284]: MDIxNVoXDTI3MTIwNDA4MDIxNVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:15 localhost certmonger[39284]: BAMMHm5wMDAwNTU0MzIyNS5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:15 localhost certmonger[39284]: AQEBBQADggEPADCCAQoCggEBANfLm64obDoFSV5mQjEqMC6ez8JKMFgL9XuSvxhg Dec 3 03:02:15 localhost certmonger[39284]: N4vfMRlHUuooQBvjSoFKX2PLvzWd+CWpXad0tBxUISR/VjBdyf98U2eBXEOVQqMi Dec 3 03:02:15 localhost certmonger[39284]: SuQuWLQwvg8jdhdhjvfvWltCBo7tbV336dkx/xkBw4tRtfyNBvGpS575zxkCGkkO Dec 3 03:02:15 localhost certmonger[39284]: 2eR0L385tCox9m9TECZHF0ZtS30HcD3xHE+pBycslPJxWZgtgDabrXQaw/IF5EoA Dec 3 03:02:15 localhost certmonger[39284]: EY3PoqPSPXuM1ipbJPcfSlhZYzdDJ5Q9avuwxzLng00gQdUkgRH6AJu2jeiIBr0l Dec 3 03:02:15 localhost certmonger[39284]: bb2OB/Lb6ob7ylLuP2J1t1gSz5L98JgY0HQw2FAuhxsviFcCAwEAAaOCAd0wggHZ Dec 3 03:02:15 localhost certmonger[39284]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:15 localhost certmonger[39284]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:15 localhost certmonger[39284]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:15 localhost certmonger[39284]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:15 localhost certmonger[39284]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:15 localhost certmonger[39284]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBC+jZ+8EnuvdmHwpQKyRsKg8bzB Dec 3 03:02:15 localhost certmonger[39284]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNS5leHRlcm5hbC5vb28udGVzdKA8 Dec 3 03:02:15 localhost certmonger[39284]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI1LmV4dGVybmFsLm9vby50 Dec 3 03:02:15 localhost certmonger[39284]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:15 localhost certmonger[39284]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjUuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Dec 3 03:02:15 localhost certmonger[39284]: hvcNAQELBQADggGBAKCT0eWABZibM/Llc17XUSK7tTv6tH+bQszzZJjW1NgJNsw3 Dec 3 03:02:15 localhost certmonger[39284]: hwXEBJy+XhhhNGmf+lAwWhmCtdtC8p/9AR7SsKbvTxOATb3s8GYdiDmUS7Pne2PL Dec 3 03:02:15 localhost certmonger[39284]: vTCzLFjfTx2sVr3Ghkuoaowg2rT8hJZREBnez6GdBOhbGKJwmlvfT6RgsGsoUz2l Dec 3 03:02:15 localhost certmonger[39284]: XK1p7UEVfrd94tAik8mbft5Tkh+bUTD6WoDR0zP6UMceZDNKo3mwIj3zpXtMtyL+ Dec 3 03:02:15 localhost certmonger[39284]: FRcb3R9b0sgN6pRQow/VauPmz6kdjPFaf3mrcmW7YZ2Y/llepDj4uVdBMBgGRXPN Dec 3 03:02:15 localhost certmonger[39284]: tfUz4RPygCSvf9KeoFsI4bb+Znr6oDx/KN946Ku22VK8QMlDZIJI8AHd+irHK4dj Dec 3 03:02:15 localhost certmonger[39284]: 3URf3AeeEdfmUbaNhn1C4nfTz5oskRrqvriMdUboqIbIczSPssSsEbiMrj7d3ObO Dec 3 03:02:15 localhost certmonger[39284]: FA/Ftu9QtniSTDoCJ8JS0KREAN4S9sNFxzw7XVSgHszL0FWMbZj+zMZVz+Q42av9 Dec 3 03:02:15 localhost certmonger[39284]: nz8eGHxNMBOSfPYtCQ== Dec 3 03:02:15 localhost certmonger[39284]: -----END CERTIFICATE----- Dec 3 03:02:15 localhost certmonger[39284]: ". Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Certificate submission still ongoing. Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Certificate submission postprocessing complete. Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Child status = 0. Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Child output: Dec 3 03:02:15 localhost certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nnz8eGHxNMBOSfPYtCQ==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:15 localhost certmonger[38530]: " Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:15 localhost certmonger[38530]: MIIFSTCCA7GgAwIBAgIBGzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:15 localhost certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:15 localhost certmonger[38530]: MDIxNVoXDTI3MTIwNDA4MDIxNVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:15 localhost certmonger[38530]: BAMMHm5wMDAwNTU0MzIyNS5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:15 localhost certmonger[38530]: AQEBBQADggEPADCCAQoCggEBANfLm64obDoFSV5mQjEqMC6ez8JKMFgL9XuSvxhg Dec 3 03:02:15 localhost certmonger[38530]: N4vfMRlHUuooQBvjSoFKX2PLvzWd+CWpXad0tBxUISR/VjBdyf98U2eBXEOVQqMi Dec 3 03:02:15 localhost certmonger[38530]: SuQuWLQwvg8jdhdhjvfvWltCBo7tbV336dkx/xkBw4tRtfyNBvGpS575zxkCGkkO Dec 3 03:02:15 localhost certmonger[38530]: 2eR0L385tCox9m9TECZHF0ZtS30HcD3xHE+pBycslPJxWZgtgDabrXQaw/IF5EoA Dec 3 03:02:15 localhost certmonger[38530]: EY3PoqPSPXuM1ipbJPcfSlhZYzdDJ5Q9avuwxzLng00gQdUkgRH6AJu2jeiIBr0l Dec 3 03:02:15 localhost certmonger[38530]: bb2OB/Lb6ob7ylLuP2J1t1gSz5L98JgY0HQw2FAuhxsviFcCAwEAAaOCAd0wggHZ Dec 3 03:02:15 localhost certmonger[38530]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:15 localhost certmonger[38530]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:15 localhost certmonger[38530]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:15 localhost certmonger[38530]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:15 localhost certmonger[38530]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:15 localhost certmonger[38530]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFBC+jZ+8EnuvdmHwpQKyRsKg8bzB Dec 3 03:02:15 localhost certmonger[38530]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNS5leHRlcm5hbC5vb28udGVzdKA8 Dec 3 03:02:15 localhost certmonger[38530]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI1LmV4dGVybmFsLm9vby50 Dec 3 03:02:15 localhost certmonger[38530]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:15 localhost certmonger[38530]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjUuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Dec 3 03:02:15 localhost certmonger[38530]: hvcNAQELBQADggGBAKCT0eWABZibM/Llc17XUSK7tTv6tH+bQszzZJjW1NgJNsw3 Dec 3 03:02:15 localhost certmonger[38530]: hwXEBJy+XhhhNGmf+lAwWhmCtdtC8p/9AR7SsKbvTxOATb3s8GYdiDmUS7Pne2PL Dec 3 03:02:15 localhost certmonger[38530]: vTCzLFjfTx2sVr3Ghkuoaowg2rT8hJZREBnez6GdBOhbGKJwmlvfT6RgsGsoUz2l Dec 3 03:02:15 localhost certmonger[38530]: XK1p7UEVfrd94tAik8mbft5Tkh+bUTD6WoDR0zP6UMceZDNKo3mwIj3zpXtMtyL+ Dec 3 03:02:15 localhost certmonger[38530]: FRcb3R9b0sgN6pRQow/VauPmz6kdjPFaf3mrcmW7YZ2Y/llepDj4uVdBMBgGRXPN Dec 3 03:02:15 localhost certmonger[38530]: tfUz4RPygCSvf9KeoFsI4bb+Znr6oDx/KN946Ku22VK8QMlDZIJI8AHd+irHK4dj Dec 3 03:02:15 localhost certmonger[38530]: 3URf3AeeEdfmUbaNhn1C4nfTz5oskRrqvriMdUboqIbIczSPssSsEbiMrj7d3ObO Dec 3 03:02:15 localhost certmonger[38530]: FA/Ftu9QtniSTDoCJ8JS0KREAN4S9sNFxzw7XVSgHszL0FWMbZj+zMZVz+Q42av9 Dec 3 03:02:15 localhost certmonger[38530]: nz8eGHxNMBOSfPYtCQ== Dec 3 03:02:15 localhost certmonger[38530]: -----END CERTIFICATE----- Dec 3 03:02:15 localhost certmonger[38530]: ". Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] No hooks set for pre-save command. Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost certmonger[39292]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Dec 3 03:02:15 localhost certmonger[38530]: 2025-12-03 08:02:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080214 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 60cb3b83-11c4-41ba-9952-12e8f88bd7cb Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:15 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d8d3453-b744-4f6e-87c4-d9a930fff24a Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 04fb05fa-5e63-4b74-bae9-0f355456e86c Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c1e9fb75-67af-42b2-8b1c-4cf4cc2e5235 Dec 3 03:02:16 localhost python3[39308]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8b3a29b2-bdb2-4408-9191-bec5678a71fb Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f305511b-c935-452f-ae16-239a50d994c2 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a9118157-6a89-4fb2-9b14-7a1d0f762846 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a9118157-6a89-4fb2-9b14-7a1d0f762846 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1b5ddae9-4c17-4dec-9088-fd75f925899d Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 04fb05fa-5e63-4b74-bae9-0f355456e86c Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 24ccecd2-3fb5-43aa-9f46-172cf949eebb Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26ff9233-d315-44a4-8fc8-1af300134084 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26ff9233-d315-44a4-8fc8-1af300134084 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ad2f27b7-040a-4b4c-84c7-0f19440dd08d Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:16 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07b48a75-4e73-4f9d-9d82-51985f68a15d Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost sedispatch[723]: AVC Message regarding setroubleshoot, ignoring message Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07b48a75-4e73-4f9d-9d82-51985f68a15d Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:18 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:19 localhost setroubleshootd[39137]: /usr/lib/python3.9/site-packages/setroubleshoot/analyze.py:378: Warning: Source ID 7 was not found when attempting to remove it Dec 3 03:02:19 localhost setroubleshootd[39137]: GLib.source_remove(self.auto_save_timer) Dec 3 03:02:19 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost kernel: VFS: idmapped mount is not enabled. Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:20 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost sedispatch[723]: AVC Message regarding setroubleshoot, ignoring message Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 17d4ebaf-6ce5-4106-987a-245272968f2c Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be45ca39-45c4-40ce-ba45-4fbc45eeb76c Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7c22db77-9700-44b4-ad19-43a1840d3e8c Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:21 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7058178f-62b0-47ce-876b-614ab7f7076a Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 60cb3b83-11c4-41ba-9952-12e8f88bd7cb Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d8d3453-b744-4f6e-87c4-d9a930fff24a Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 04fb05fa-5e63-4b74-bae9-0f355456e86c Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c1e9fb75-67af-42b2-8b1c-4cf4cc2e5235 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8b3a29b2-bdb2-4408-9191-bec5678a71fb Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f305511b-c935-452f-ae16-239a50d994c2 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a9118157-6a89-4fb2-9b14-7a1d0f762846 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a9118157-6a89-4fb2-9b14-7a1d0f762846 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1b5ddae9-4c17-4dec-9088-fd75f925899d Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 04fb05fa-5e63-4b74-bae9-0f355456e86c Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 24ccecd2-3fb5-43aa-9f46-172cf949eebb Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26ff9233-d315-44a4-8fc8-1af300134084 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26ff9233-d315-44a4-8fc8-1af300134084 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ad2f27b7-040a-4b4c-84c7-0f19440dd08d Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07b48a75-4e73-4f9d-9d82-51985f68a15d Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07b48a75-4e73-4f9d-9d82-51985f68a15d Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 17d4ebaf-6ce5-4106-987a-245272968f2c Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7c22db77-9700-44b4-ad19-43a1840d3e8c Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3e26564d-eebd-4867-a2c8-ff224969c022 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:22 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7058178f-62b0-47ce-876b-614ab7f7076a Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 60cb3b83-11c4-41ba-9952-12e8f88bd7cb Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d8d3453-b744-4f6e-87c4-d9a930fff24a Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 04fb05fa-5e63-4b74-bae9-0f355456e86c Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c1e9fb75-67af-42b2-8b1c-4cf4cc2e5235 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8b3a29b2-bdb2-4408-9191-bec5678a71fb Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f305511b-c935-452f-ae16-239a50d994c2 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a9118157-6a89-4fb2-9b14-7a1d0f762846 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a9118157-6a89-4fb2-9b14-7a1d0f762846 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1b5ddae9-4c17-4dec-9088-fd75f925899d Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 04fb05fa-5e63-4b74-bae9-0f355456e86c Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 24ccecd2-3fb5-43aa-9f46-172cf949eebb Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26ff9233-d315-44a4-8fc8-1af300134084 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26ff9233-d315-44a4-8fc8-1af300134084 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ad2f27b7-040a-4b4c-84c7-0f19440dd08d Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07b48a75-4e73-4f9d-9d82-51985f68a15d Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 17d4ebaf-6ce5-4106-987a-245272968f2c Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be45ca39-45c4-40ce-ba45-4fbc45eeb76c Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7c22db77-9700-44b4-ad19-43a1840d3e8c Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3e26564d-eebd-4867-a2c8-ff224969c022 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:23 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7058178f-62b0-47ce-876b-614ab7f7076a Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 60cb3b83-11c4-41ba-9952-12e8f88bd7cb Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d8d3453-b744-4f6e-87c4-d9a930fff24a Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 04fb05fa-5e63-4b74-bae9-0f355456e86c Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c1e9fb75-67af-42b2-8b1c-4cf4cc2e5235 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8b3a29b2-bdb2-4408-9191-bec5678a71fb Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f305511b-c935-452f-ae16-239a50d994c2 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a9118157-6a89-4fb2-9b14-7a1d0f762846 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07b48a75-4e73-4f9d-9d82-51985f68a15d Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 17d4ebaf-6ce5-4106-987a-245272968f2c Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be45ca39-45c4-40ce-ba45-4fbc45eeb76c Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7c22db77-9700-44b4-ad19-43a1840d3e8c Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3e26564d-eebd-4867-a2c8-ff224969c022 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:24 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7058178f-62b0-47ce-876b-614ab7f7076a Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 60cb3b83-11c4-41ba-9952-12e8f88bd7cb Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff1cbdc4-91a4-43db-bfad-b5f1898c90bd Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 439d973e-831d-4e18-af44-ea30cd395c1e Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1d8d3453-b744-4f6e-87c4-d9a930fff24a Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e46ae578-9be6-4696-b7e5-19e1dc6b5725 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 04fb05fa-5e63-4b74-bae9-0f355456e86c Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c1e9fb75-67af-42b2-8b1c-4cf4cc2e5235 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8b3a29b2-bdb2-4408-9191-bec5678a71fb Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f305511b-c935-452f-ae16-239a50d994c2 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a9118157-6a89-4fb2-9b14-7a1d0f762846 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a9118157-6a89-4fb2-9b14-7a1d0f762846 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 1b5ddae9-4c17-4dec-9088-fd75f925899d Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 04fb05fa-5e63-4b74-bae9-0f355456e86c Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 24ccecd2-3fb5-43aa-9f46-172cf949eebb Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26ff9233-d315-44a4-8fc8-1af300134084 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26ff9233-d315-44a4-8fc8-1af300134084 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ad2f27b7-040a-4b4c-84c7-0f19440dd08d Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07b48a75-4e73-4f9d-9d82-51985f68a15d Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 07b48a75-4e73-4f9d-9d82-51985f68a15d Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 17d4ebaf-6ce5-4106-987a-245272968f2c Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l be45ca39-45c4-40ce-ba45-4fbc45eeb76c Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 7c22db77-9700-44b4-ad19-43a1840d3e8c Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 130013ba-8716-4487-8ca6-b6f4d491c786 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9ebd7c75-5b58-41d4-b1f0-7a1b661da7fc Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 75ad4469-9677-4f6f-9ca1-08b3ed9cac92 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3e26564d-eebd-4867-a2c8-ff224969c022 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ff3bbe20-64cb-48e8-abe8-41cd3701fc89 Dec 3 03:02:25 localhost setroubleshoot[39137]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost sshd[39518]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:02:32 localhost podman[39309]: 2025-12-03 08:02:16.320361467 +0000 UTC m=+0.044318806 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Dec 3 03:02:32 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:02:32 localhost python3[39535]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 cluster.common.tag/cinder-backup:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:32 localhost podman[39536]: 2025-12-03 08:02:32.955001292 +0000 UTC m=+0.050387708 image tag 01162f309a727f9f16ef893d348a6167be101f9c31f2a9a381f4a430ffc3b21a cluster.common.tag/cinder-backup:pcmklatest Dec 3 03:02:32 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:02:33 localhost python3[39564]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:35 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Dec 3 03:02:35 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.642s CPU time. Dec 3 03:02:36 localhost systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 3 03:02:36 localhost systemd[1]: setroubleshootd.service: Consumed 16.652s CPU time. Dec 3 03:02:37 localhost podman[39565]: 2025-12-03 08:02:33.522225277 +0000 UTC m=+0.046659745 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Dec 3 03:02:37 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:02:38 localhost python3[39632]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 cluster.common.tag/cinder-volume:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:38 localhost podman[39633]: 2025-12-03 08:02:38.173642337 +0000 UTC m=+0.047263773 image tag ccd22ddeb69c8f3a05d2d3f97d21f9fa64c6f2bc3a156f93212de7feacea314f cluster.common.tag/cinder-volume:pcmklatest Dec 3 03:02:38 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:02:38 localhost python3[39659]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:39 localhost python3[39676]: ansible-blockinfile Invoked with content=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 create=True path=/etc/rsyslog.d/openstack-haproxy.conf block=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:02:39 np0005543225 python3[39692]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 08:02:39 np0005543225 systemd[1]: Stopping System Logging Service... Dec 3 08:02:39 np0005543225 rsyslogd[758]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="758" x-info="https://www.rsyslog.com"] exiting on signal 15. Dec 3 08:02:39 np0005543225 systemd[1]: rsyslog.service: Deactivated successfully. Dec 3 08:02:39 np0005543225 systemd[1]: Stopped System Logging Service. Dec 3 08:02:39 np0005543225 systemd[1]: rsyslog.service: Consumed 1.437s CPU time, read 920.0K from disk, written 3.6M to disk. Dec 3 08:02:39 np0005543225 systemd[1]: Starting System Logging Service... Dec 3 08:02:39 np0005543225 systemd[1]: Started System Logging Service. Dec 3 08:02:39 np0005543225 rsyslogd[39695]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="39695" x-info="https://www.rsyslog.com"] start Dec 3 08:02:39 np0005543225 rsyslogd[39695]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 08:02:40 np0005543225 python3[39714]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:02:45 np0005543225 podman[39715]: 2025-12-03 08:02:40.556868366 +0000 UTC m=+0.043462730 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Dec 3 08:02:45 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:02:45 np0005543225 python3[39781]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 cluster.common.tag/haproxy:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:02:45 np0005543225 podman[39782]: 2025-12-03 08:02:45.66903197 +0000 UTC m=+0.051680895 image tag bc0fbe6b9534c6b74951010de79a1ae57713cd63ed3f582d78ca1561a7041088 cluster.common.tag/haproxy:pcmklatest Dec 3 08:02:45 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:02:46 np0005543225 python3[39808]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:02:49 np0005543225 python3[39825]: ansible-systemd Invoked with enabled=True masked=False name=certmonger.service state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None Dec 3 08:02:49 np0005543225 python3[39844]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 08:02:50 np0005543225 python3[39860]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 08:02:50 np0005543225 python3[39876]: ansible-ansible.legacy.command Invoked with _raw_params=set -e#012ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012chmod 0644 ${ca_pem}#012update-ca-trust extract#012test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:02:51 np0005543225 python3[39902]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:02:52 np0005543225 python3[39922]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:02:55 np0005543225 python3[39939]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:02:58 np0005543225 python3[39956]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:02:59 np0005543225 python3[39972]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:00 np0005543225 python3[40000]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:03:02 np0005543225 python3[40200]: ansible-certificate_request Invoked with name=haproxy-external-cert dns=['overcloud.ooo.test'] ip=[] principal=['haproxy/overcloud.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-external-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012cp "/etc/pki/tls/private/haproxy-external-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012#012ca_type=ipa#012if [ "$ca_type" = "self-sign" ]; then#012 # refresh the ca cert just in case the ca cert has been renewed#012 ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012 openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012 chmod 0644 ${ca_pem}#012 update-ca-trust extract#012 test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 openssl x509 -in ${ca_pem} -out /tmp/cm-local-ca.pem#012 ca_path="/tmp/cm-local-ca.pem"#012else#012 ca_path="/etc/ipa/ca.crt"#012fi#012#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012service_pem="/etc/pki/tls/private/overcloud_endpoint.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_REQ_SUBJECT" to "CN=overcloud.ooo.test" for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_REQ_HOSTNAME" to "overcloud.ooo.test Dec 3 08:03:02 np0005543225 certmonger[40210]: " for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/overcloud.ooo.test@OOO.TEST Dec 3 08:03:02 np0005543225 certmonger[40210]: " for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:02 np0005543225 certmonger[40210]: MIIDmjCCAoICAQAwHTEbMBkGA1UEAxMSb3ZlcmNsb3VkLm9vby50ZXN0MIIBIjAN Dec 3 08:03:02 np0005543225 certmonger[40210]: BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsnS4fySFrH3coxcFQ/VcigaWNIFL Dec 3 08:03:02 np0005543225 certmonger[40210]: dj+Gf0TlUeuSUMtVyUbkuU8ICFMpxxWAGyRASlMa68Q+n3/4bW5Uuzh6UjFrrRIq Dec 3 08:03:02 np0005543225 certmonger[40210]: 4ff9MGNwGyx59sGTbny9i86m03SKsQar+cnKa0k2wg+WdvC8h+qkigpAvq8K6xbA Dec 3 08:03:02 np0005543225 certmonger[40210]: m/2kIL7+ybmxUX3voB1WzDJGSHnsjsZdJ1l3LOlctSONz1rC9VfcG22WrGWVVQdt Dec 3 08:03:02 np0005543225 certmonger[40210]: O2wS+hdB9e8TT7FenY1isc6qdyDFlqmUJY8AJNuI3uaCyJPhMufcadEL6dIO+zUG Dec 3 08:03:02 np0005543225 certmonger[40210]: tGFVntQtlUKyBamvGOq2D+IplvyN+O81Kbphp01ki1eVg+U9DVw9E6VqywIDAQAB Dec 3 08:03:02 np0005543225 certmonger[40210]: oIIBNjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAAMwAwADgAMAAzADAA Dec 3 08:03:02 np0005543225 certmonger[40210]: MjCCAQUGCSqGSIb3DQEJDjGB9zCB9DALBgNVHQ8EBAMCBaAwgZgGA1UdEQSBkDCB Dec 3 08:03:02 np0005543225 certmonger[40210]: jYISb3ZlcmNsb3VkLm9vby50ZXN0oDMGCisGAQQBgjcUAgOgJQwjaGFwcm94eS9v Dec 3 08:03:02 np0005543225 certmonger[40210]: dmVyY2xvdWQub29vLnRlc3RAT09PLlRFU1SgQgYGKwYBBQICoDgwNqAKGwhPT08u Dec 3 08:03:02 np0005543225 certmonger[40210]: VEVTVKEoMCagAwIBAaEfMB0bB2hhcHJveHkbEm92ZXJjbG91ZC5vb28udGVzdDAd Dec 3 08:03:02 np0005543225 certmonger[40210]: BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNV Dec 3 08:03:02 np0005543225 certmonger[40210]: HQ4EFgQUgHDhEr6CDat5tHSdJKI9qcm/+0wwDQYJKoZIhvcNAQELBQADggEBAGLV Dec 3 08:03:02 np0005543225 certmonger[40210]: rgZj7y2ufDi/qi/D0cGu7u/CE4Ha0vgCTOQKnh06m/ccvCQw9zRMr65/xUIAvvik Dec 3 08:03:02 np0005543225 certmonger[40210]: KvdsDPLer3yzHtG2d2nP5IvAj8EpoiPJhecndviHSahKknXJ7u5Mqc3HsVwx4TnU Dec 3 08:03:02 np0005543225 certmonger[40210]: c6ZPebg8wLW+JVyKeqCNrz+159SiKEnf79NNvpT1cNSjBNRH6GmEioeyJPkoAvST Dec 3 08:03:02 np0005543225 certmonger[40210]: p0xysyPCbGa5Dcet3/wxJGKoACqt+QVh/9Wb+xvB1QCGbihnYF4y7fwvd+XuaK4P Dec 3 08:03:02 np0005543225 certmonger[40210]: nOg+PY7mbbBsYBCz9CekZkcMyUq2HAf/yGGXvG2wJzybTbWKkzdFBTbU/jZWxqj+ Dec 3 08:03:02 np0005543225 certmonger[40210]: 5V7MSXVOCUhxXbAwWqg= Dec 3 08:03:02 np0005543225 certmonger[40210]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:02 np0005543225 certmonger[40210]: " for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsnS4fySFrH3coxcFQ/VcigaWNIFLdj+Gf0TlUeuSUMtVyUbkuU8ICFMpxxWAGyRASlMa68Q+n3/4bW5Uuzh6UjFrrRIq4ff9MGNwGyx59sGTbny9i86m03SKsQar+cnKa0k2wg+WdvC8h+qkigpAvq8K6xbAm/2kIL7+ybmxUX3voB1WzDJGSHnsjsZdJ1l3LOlctSONz1rC9VfcG22WrGWVVQdtO2wS+hdB9e8TT7FenY1isc6qdyDFlqmUJY8AJNuI3uaCyJPhMufcadEL6dIO+zUGtGFVntQtlUKyBamvGOq2D+IplvyN+O81Kbphp01ki1eVg+U9DVw9E6VqywIDAQAB" for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:02 np0005543225 certmonger[40210]: 2025-12-03 08:03:02 [40210] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:02 np0005543225 certmonger[38530]: 2025-12-03 08:03:02 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543225 certmonger[40210]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:03 np0005543225 certmonger[40210]: Certificate: "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" Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Certificate submission still ongoing. Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Certificate submission attempt complete. Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Child status = 0. Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Child output: Dec 3 08:03:03 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:03 np0005543225 certmonger[38530]: MIIFHzCCA4egAwIBAgIBKDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:03 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:03 np0005543225 certmonger[38530]: MDMwM1oXDTI3MTIwNDA4MDMwM1owMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Dec 3 08:03:03 np0005543225 certmonger[38530]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Dec 3 08:03:03 np0005543225 certmonger[38530]: AQoCggEBALJ0uH8khax93KMXBUP1XIoGljSBS3Y/hn9E5VHrklDLVclG5LlPCAhT Dec 3 08:03:03 np0005543225 certmonger[38530]: KccVgBskQEpTGuvEPp9/+G1uVLs4elIxa60SKuH3/TBjcBssefbBk258vYvOptN0 Dec 3 08:03:03 np0005543225 certmonger[38530]: irEGq/nJymtJNsIPlnbwvIfqpIoKQL6vCusWwJv9pCC+/sm5sVF976AdVswyRkh5 Dec 3 08:03:03 np0005543225 certmonger[38530]: 7I7GXSdZdyzpXLUjjc9awvVX3BttlqxllVUHbTtsEvoXQfXvE0+xXp2NYrHOqncg Dec 3 08:03:03 np0005543225 certmonger[38530]: xZaplCWPACTbiN7mgsiT4TLn3GnRC+nSDvs1BrRhVZ7ULZVCsgWprxjqtg/iKZb8 Dec 3 08:03:03 np0005543225 certmonger[38530]: jfjvNSm6YadNZItXlYPlPQ1cPROlassCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Dec 3 08:03:03 np0005543225 certmonger[38530]: FILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Dec 3 08:03:03 np0005543225 certmonger[38530]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Dec 3 08:03:03 np0005543225 certmonger[38530]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Dec 3 08:03:03 np0005543225 certmonger[38530]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Dec 3 08:03:03 np0005543225 certmonger[38530]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Dec 3 08:03:03 np0005543225 certmonger[38530]: b3JpdHkwHQYDVR0OBBYEFPJiPKgcV6XUtatgfmqYXYR0IB98MIGYBgNVHREEgZAw Dec 3 08:03:03 np0005543225 certmonger[38530]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Dec 3 08:03:03 np0005543225 certmonger[38530]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Dec 3 08:03:03 np0005543225 certmonger[38530]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Dec 3 08:03:03 np0005543225 certmonger[38530]: DQYJKoZIhvcNAQELBQADggGBAFfeYbeE5rCDYOzMUbrMs3KbHQzLnjsHS8uc0266 Dec 3 08:03:03 np0005543225 certmonger[38530]: R2WExE4Cklat+nIUxGtucap/MMUfvSTkQrKe4e+9BFOraDLlEwaAmWcbTHWmjY11 Dec 3 08:03:03 np0005543225 certmonger[38530]: 5K3jB4h5zGJO4stlEDLPnwbyHBZew2b+SDyGGK+ZLsyJA6qgMsoVpTmYupNlwIGe Dec 3 08:03:03 np0005543225 certmonger[38530]: P0mBBxoVxChcbAOdeHmUGTqCf2EON2VcIf72L5MgBN7d/+XQYoTetEfT8U7ivbu8 Dec 3 08:03:03 np0005543225 certmonger[38530]: OakkN8OZq2hp2//AoYLGu49fefYxfHK3qctsYvVbvmpvH707fIXa4nW/j1S7OMQ5 Dec 3 08:03:03 np0005543225 certmonger[38530]: vJLPLjNdoptz/CSXgxNo1qiCmrHN6ZNL5zLCrdKGBQqwZqG3UpMmrxICml1L5AqM Dec 3 08:03:03 np0005543225 certmonger[38530]: QbG5VZhrPpr9+UuG4WLy06zb1gDdvUrfGbowj9eigPFl9VHRjtRESEztm5Bw18Rw Dec 3 08:03:03 np0005543225 certmonger[38530]: 8BoM6XkaYzzIBepebzegfJqRrWvPwJYRLm3tyq0YWE9l1XyAFg3uoM8dstWejntm Dec 3 08:03:03 np0005543225 certmonger[38530]: C+c5steI600ASjBxW/+O6DN23w== Dec 3 08:03:03 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:03 np0005543225 certmonger[38530]: " Dec 3 08:03:03 np0005543225 certmonger[40212]: 2025-12-03 08:03:03 [40212] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:03 np0005543225 certmonger[40212]: MIIFHzCCA4egAwIBAgIBKDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:03 np0005543225 certmonger[40212]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:03 np0005543225 certmonger[40212]: MDMwM1oXDTI3MTIwNDA4MDMwM1owMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Dec 3 08:03:03 np0005543225 certmonger[40212]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Dec 3 08:03:03 np0005543225 certmonger[40212]: AQoCggEBALJ0uH8khax93KMXBUP1XIoGljSBS3Y/hn9E5VHrklDLVclG5LlPCAhT Dec 3 08:03:03 np0005543225 certmonger[40212]: KccVgBskQEpTGuvEPp9/+G1uVLs4elIxa60SKuH3/TBjcBssefbBk258vYvOptN0 Dec 3 08:03:03 np0005543225 certmonger[40212]: irEGq/nJymtJNsIPlnbwvIfqpIoKQL6vCusWwJv9pCC+/sm5sVF976AdVswyRkh5 Dec 3 08:03:03 np0005543225 certmonger[40212]: 7I7GXSdZdyzpXLUjjc9awvVX3BttlqxllVUHbTtsEvoXQfXvE0+xXp2NYrHOqncg Dec 3 08:03:03 np0005543225 certmonger[40212]: xZaplCWPACTbiN7mgsiT4TLn3GnRC+nSDvs1BrRhVZ7ULZVCsgWprxjqtg/iKZb8 Dec 3 08:03:03 np0005543225 certmonger[40212]: jfjvNSm6YadNZItXlYPlPQ1cPROlassCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Dec 3 08:03:03 np0005543225 certmonger[40212]: FILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Dec 3 08:03:03 np0005543225 certmonger[40212]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Dec 3 08:03:03 np0005543225 certmonger[40212]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Dec 3 08:03:03 np0005543225 certmonger[40212]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Dec 3 08:03:03 np0005543225 certmonger[40212]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Dec 3 08:03:03 np0005543225 certmonger[40212]: b3JpdHkwHQYDVR0OBBYEFPJiPKgcV6XUtatgfmqYXYR0IB98MIGYBgNVHREEgZAw Dec 3 08:03:03 np0005543225 certmonger[40212]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Dec 3 08:03:03 np0005543225 certmonger[40212]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Dec 3 08:03:03 np0005543225 certmonger[40212]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Dec 3 08:03:03 np0005543225 certmonger[40212]: DQYJKoZIhvcNAQELBQADggGBAFfeYbeE5rCDYOzMUbrMs3KbHQzLnjsHS8uc0266 Dec 3 08:03:03 np0005543225 certmonger[40212]: R2WExE4Cklat+nIUxGtucap/MMUfvSTkQrKe4e+9BFOraDLlEwaAmWcbTHWmjY11 Dec 3 08:03:03 np0005543225 certmonger[40212]: 5K3jB4h5zGJO4stlEDLPnwbyHBZew2b+SDyGGK+ZLsyJA6qgMsoVpTmYupNlwIGe Dec 3 08:03:03 np0005543225 certmonger[40212]: P0mBBxoVxChcbAOdeHmUGTqCf2EON2VcIf72L5MgBN7d/+XQYoTetEfT8U7ivbu8 Dec 3 08:03:03 np0005543225 certmonger[40212]: OakkN8OZq2hp2//AoYLGu49fefYxfHK3qctsYvVbvmpvH707fIXa4nW/j1S7OMQ5 Dec 3 08:03:03 np0005543225 certmonger[40212]: vJLPLjNdoptz/CSXgxNo1qiCmrHN6ZNL5zLCrdKGBQqwZqG3UpMmrxICml1L5AqM Dec 3 08:03:03 np0005543225 certmonger[40212]: QbG5VZhrPpr9+UuG4WLy06zb1gDdvUrfGbowj9eigPFl9VHRjtRESEztm5Bw18Rw Dec 3 08:03:03 np0005543225 certmonger[40212]: 8BoM6XkaYzzIBepebzegfJqRrWvPwJYRLm3tyq0YWE9l1XyAFg3uoM8dstWejntm Dec 3 08:03:03 np0005543225 certmonger[40212]: C+c5steI600ASjBxW/+O6DN23w== Dec 3 08:03:03 np0005543225 certmonger[40212]: -----END CERTIFICATE----- Dec 3 08:03:03 np0005543225 certmonger[40212]: ". Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Certificate submission still ongoing. Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Certificate submission postprocessing complete. Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Child status = 0. Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Child output: Dec 3 08:03:03 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nC+c5steI600ASjBxW/+O6DN23w==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:03 np0005543225 certmonger[38530]: " Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:03 np0005543225 certmonger[38530]: MIIFHzCCA4egAwIBAgIBKDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:03 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:03 np0005543225 certmonger[38530]: MDMwM1oXDTI3MTIwNDA4MDMwM1owMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Dec 3 08:03:03 np0005543225 certmonger[38530]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Dec 3 08:03:03 np0005543225 certmonger[38530]: AQoCggEBALJ0uH8khax93KMXBUP1XIoGljSBS3Y/hn9E5VHrklDLVclG5LlPCAhT Dec 3 08:03:03 np0005543225 certmonger[38530]: KccVgBskQEpTGuvEPp9/+G1uVLs4elIxa60SKuH3/TBjcBssefbBk258vYvOptN0 Dec 3 08:03:03 np0005543225 certmonger[38530]: irEGq/nJymtJNsIPlnbwvIfqpIoKQL6vCusWwJv9pCC+/sm5sVF976AdVswyRkh5 Dec 3 08:03:03 np0005543225 certmonger[38530]: 7I7GXSdZdyzpXLUjjc9awvVX3BttlqxllVUHbTtsEvoXQfXvE0+xXp2NYrHOqncg Dec 3 08:03:03 np0005543225 certmonger[38530]: xZaplCWPACTbiN7mgsiT4TLn3GnRC+nSDvs1BrRhVZ7ULZVCsgWprxjqtg/iKZb8 Dec 3 08:03:03 np0005543225 certmonger[38530]: jfjvNSm6YadNZItXlYPlPQ1cPROlassCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Dec 3 08:03:03 np0005543225 certmonger[38530]: FILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Dec 3 08:03:03 np0005543225 certmonger[38530]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Dec 3 08:03:03 np0005543225 certmonger[38530]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Dec 3 08:03:03 np0005543225 certmonger[38530]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Dec 3 08:03:03 np0005543225 certmonger[38530]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Dec 3 08:03:03 np0005543225 certmonger[38530]: b3JpdHkwHQYDVR0OBBYEFPJiPKgcV6XUtatgfmqYXYR0IB98MIGYBgNVHREEgZAw Dec 3 08:03:03 np0005543225 certmonger[38530]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Dec 3 08:03:03 np0005543225 certmonger[38530]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Dec 3 08:03:03 np0005543225 certmonger[38530]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Dec 3 08:03:03 np0005543225 certmonger[38530]: DQYJKoZIhvcNAQELBQADggGBAFfeYbeE5rCDYOzMUbrMs3KbHQzLnjsHS8uc0266 Dec 3 08:03:03 np0005543225 certmonger[38530]: R2WExE4Cklat+nIUxGtucap/MMUfvSTkQrKe4e+9BFOraDLlEwaAmWcbTHWmjY11 Dec 3 08:03:03 np0005543225 certmonger[38530]: 5K3jB4h5zGJO4stlEDLPnwbyHBZew2b+SDyGGK+ZLsyJA6qgMsoVpTmYupNlwIGe Dec 3 08:03:03 np0005543225 certmonger[38530]: P0mBBxoVxChcbAOdeHmUGTqCf2EON2VcIf72L5MgBN7d/+XQYoTetEfT8U7ivbu8 Dec 3 08:03:03 np0005543225 certmonger[38530]: OakkN8OZq2hp2//AoYLGu49fefYxfHK3qctsYvVbvmpvH707fIXa4nW/j1S7OMQ5 Dec 3 08:03:03 np0005543225 certmonger[38530]: vJLPLjNdoptz/CSXgxNo1qiCmrHN6ZNL5zLCrdKGBQqwZqG3UpMmrxICml1L5AqM Dec 3 08:03:03 np0005543225 certmonger[38530]: QbG5VZhrPpr9+UuG4WLy06zb1gDdvUrfGbowj9eigPFl9VHRjtRESEztm5Bw18Rw Dec 3 08:03:03 np0005543225 certmonger[38530]: 8BoM6XkaYzzIBepebzegfJqRrWvPwJYRLm3tyq0YWE9l1XyAFg3uoM8dstWejntm Dec 3 08:03:03 np0005543225 certmonger[38530]: C+c5steI600ASjBxW/+O6DN23w== Dec 3 08:03:03 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:03 np0005543225 certmonger[38530]: ". Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] No hooks set for pre-save command. Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:03 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543225 certmonger[40282]: Certificate in file "/etc/pki/tls/certs/haproxy-external-cert.crt" issued by CA and saved. Dec 3 08:03:03 np0005543225 certmonger[38530]: 2025-12-03 08:03:03 [38530] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:04 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:04 np0005543225 python3[40298]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 08:03:05 np0005543225 python3[40314]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 08:03:05 np0005543225 python3[40331]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:03:06 np0005543225 python3[40351]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:09 np0005543225 python3[40368]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:13 np0005543225 python3[40385]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:13 np0005543225 python3[40401]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:14 np0005543225 python3[40417]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:03:14 np0005543225 python3[40435]: ansible-certificate_request Invoked with name=haproxy-ctlplane-cert dns=['np0005543225.ctlplane.ooo.test', 'overcloud.ctlplane.ooo.test'] principal=['haproxy/np0005543225.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012cp "/etc/pki/tls/private/haproxy-ctlplane-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.ctlplane.ooo.test" for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.ctlplane.ooo.test Dec 3 08:03:15 np0005543225 certmonger[40445]: overcloud.ctlplane.ooo.test Dec 3 08:03:15 np0005543225 certmonger[40445]: " for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005543225.ctlplane.ooo.test@OOO.TEST Dec 3 08:03:15 np0005543225 certmonger[40445]: " for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:15 np0005543225 certmonger[40445]: MIID6TCCAtECAQAwKTEnMCUGA1UEAxMebnAwMDA1NTQzMjI1LmN0bHBsYW5lLm9v Dec 3 08:03:15 np0005543225 certmonger[40445]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwas2v+1nJK/u Dec 3 08:03:15 np0005543225 certmonger[40445]: ATKJdI3TyNXLludmvIU2JFghK6v2sytgcCS9ZTG1HZM4Y9TLWj2+bx+ZlSPz14EP Dec 3 08:03:15 np0005543225 certmonger[40445]: XtzGslgnXT68ssHxY9aMttRl0Or+DpHIXIl1SBBbeoXoaWdZUoqCIGe/dY4G+qRR Dec 3 08:03:15 np0005543225 certmonger[40445]: l4TXf3OmbnVXyPKso7Mnv99XXcfgJLttX3vI6dz2CzJ2m2689fhQqxgtL0x9qu4B Dec 3 08:03:15 np0005543225 certmonger[40445]: 7vA3OYbOyjGncjo/qWoryD+Q+igd2uzT7qA1fI0WiI+7foRNYBhOi91l+hx3cged Dec 3 08:03:15 np0005543225 certmonger[40445]: iIBqKcqbYxIHk3+iQW3ihDIH2dkFx3bQtKmUvBy6A3nGwkijO0j2/DVSSyVJWBiV Dec 3 08:03:15 np0005543225 certmonger[40445]: D58PbLfT/QIDAQABoIIBeTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAA Dec 3 08:03:15 np0005543225 certmonger[40445]: MwAwADgAMAAzADEANTCCAUgGCSqGSIb3DQEJDjGCATkwggE1MAsGA1UdDwQEAwIF Dec 3 08:03:15 np0005543225 certmonger[40445]: oDCB2QYDVR0RBIHRMIHOgh5ucDAwMDU1NDMyMjUuY3RscGxhbmUub29vLnRlc3SC Dec 3 08:03:15 np0005543225 certmonger[40445]: G292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML2hh Dec 3 08:03:15 np0005543225 certmonger[40445]: cHJveHkvbnAwMDA1NTQzMjI1LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoE4G Dec 3 08:03:15 np0005543225 certmonger[40445]: BisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwdoYXByb3h5Gx5u Dec 3 08:03:15 np0005543225 certmonger[40445]: cDAwMDU1NDMyMjUuY3RscGxhbmUub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUH Dec 3 08:03:15 np0005543225 certmonger[40445]: AwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFF9KM4zu+cQLrgFD Dec 3 08:03:15 np0005543225 certmonger[40445]: /ntJ55wyCHeoMA0GCSqGSIb3DQEBCwUAA4IBAQAke1eUAZcpKabbRNcM7WinapTu Dec 3 08:03:15 np0005543225 certmonger[40445]: WyiDkFyBiCI+/d2BzZTcegE8jbahvym/u9ldn9DerAu9rchXPpunBPAVura/0llE Dec 3 08:03:15 np0005543225 certmonger[40445]: Ck+mfhDSTgXwcigmKBFNylytzBLPBdY0CK1pBGyEr5Gep94jfkmdQwPtRDfpGb3R Dec 3 08:03:15 np0005543225 certmonger[40445]: gzg6vRjpMlECxBynzGl3T36Zya+OQty+lMkXdCELpDM/in0Wu71E/EY/9bc7X2On Dec 3 08:03:15 np0005543225 certmonger[40445]: Uvee078nLmxmPePWqUXNPTIACtVEkkYROlxApvIggLqs+RmNQ+/N70vmdjoHFTRJ Dec 3 08:03:15 np0005543225 certmonger[40445]: 2U0BxXagYMSoRlGdIpNYrVaWxndBQmfjXqEFiqDqxL843S6nGaR6yxRQ3Fsp Dec 3 08:03:15 np0005543225 certmonger[40445]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:15 np0005543225 certmonger[40445]: " for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwas2v+1nJK/uATKJdI3TyNXLludmvIU2JFghK6v2sytgcCS9ZTG1HZM4Y9TLWj2+bx+ZlSPz14EPXtzGslgnXT68ssHxY9aMttRl0Or+DpHIXIl1SBBbeoXoaWdZUoqCIGe/dY4G+qRRl4TXf3OmbnVXyPKso7Mnv99XXcfgJLttX3vI6dz2CzJ2m2689fhQqxgtL0x9qu4B7vA3OYbOyjGncjo/qWoryD+Q+igd2uzT7qA1fI0WiI+7foRNYBhOi91l+hx3cgediIBqKcqbYxIHk3+iQW3ihDIH2dkFx3bQtKmUvBy6A3nGwkijO0j2/DVSSyVJWBiVD58PbLfT/QIDAQAB" for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:15 np0005543225 certmonger[40445]: 2025-12-03 08:03:15 [40445] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:15 np0005543225 certmonger[38530]: 2025-12-03 08:03:15 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543225 certmonger[40445]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:16 np0005543225 certmonger[40445]: Certificate: "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" Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Certificate submission still ongoing. Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Certificate submission attempt complete. Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Child status = 0. Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Child output: Dec 3 08:03:16 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:16 np0005543225 certmonger[38530]: MIIFbDCCA9SgAwIBAgIBKzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:16 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:16 np0005543225 certmonger[38530]: MDMxNVoXDTI3MTIwNDA4MDMxNVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 08:03:16 np0005543225 certmonger[38530]: BAMMHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 08:03:16 np0005543225 certmonger[38530]: AQEBBQADggEPADCCAQoCggEBAMGrNr/tZySv7gEyiXSN08jVy5bnZryFNiRYISur Dec 3 08:03:16 np0005543225 certmonger[38530]: 9rMrYHAkvWUxtR2TOGPUy1o9vm8fmZUj89eBD17cxrJYJ10+vLLB8WPWjLbUZdDq Dec 3 08:03:16 np0005543225 certmonger[38530]: /g6RyFyJdUgQW3qF6GlnWVKKgiBnv3WOBvqkUZeE139zpm51V8jyrKOzJ7/fV13H Dec 3 08:03:16 np0005543225 certmonger[38530]: 4CS7bV97yOnc9gsydptuvPX4UKsYLS9MfaruAe7wNzmGzsoxp3I6P6lqK8g/kPoo Dec 3 08:03:16 np0005543225 certmonger[38530]: Hdrs0+6gNXyNFoiPu36ETWAYTovdZfocd3IHnYiAainKm2MSB5N/okFt4oQyB9nZ Dec 3 08:03:16 np0005543225 certmonger[38530]: Bcd20LSplLwcugN5xsJIoztI9vw1UkslSVgYlQ+fD2y30/0CAwEAAaOCAgAwggH8 Dec 3 08:03:16 np0005543225 certmonger[38530]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 08:03:16 np0005543225 certmonger[38530]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 08:03:16 np0005543225 certmonger[38530]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 08:03:16 np0005543225 certmonger[38530]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 08:03:16 np0005543225 certmonger[38530]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 08:03:16 np0005543225 certmonger[38530]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFAIqB+npO7ALjzGpNd+5Yb+rOrl9 Dec 3 08:03:16 np0005543225 certmonger[38530]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdIIb Dec 3 08:03:16 np0005543225 certmonger[38530]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Dec 3 08:03:16 np0005543225 certmonger[38530]: cm94eS9ucDAwMDU1NDMyMjUuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Dec 3 08:03:16 np0005543225 certmonger[38530]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Dec 3 08:03:16 np0005543225 certmonger[38530]: MDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Dec 3 08:03:16 np0005543225 certmonger[38530]: d8Wd/AuibWN2rDcyr5DKIDmdqmxFgfZjh8IDaCIZTPrflhnF+WGnLLbc4+S5UHzt Dec 3 08:03:16 np0005543225 certmonger[38530]: LaDvRzr/ek3WZDbSkWXCmzdlQQPMs+TzFQB5u4RSk8CltlhYx7EJ77l1U6fE/yfL Dec 3 08:03:16 np0005543225 certmonger[38530]: 5us8vInG4UVCORwhOK7KXU5eNolGEmhXT6iSX5EYMkYYeCURMFK46Aao3a9OBv7g Dec 3 08:03:16 np0005543225 certmonger[38530]: JjbwszusOzlRQwSXDKGFyaYsYvJSlCPzAL0fU2amjrUJkS6bjqh6W2P+JGc9m078 Dec 3 08:03:16 np0005543225 certmonger[38530]: rxk7aNv9x/fUXwOT5XbxapK0kbS3SeAiYpXorWh3Vu3GyefLchq8hdFWxXGPVzDf Dec 3 08:03:16 np0005543225 certmonger[38530]: CaNN/U5kyrC+cACSMm4XiziXP6iivYJCPLrNown5qR9b9s1MgBnd/m69eoyU5QRl Dec 3 08:03:16 np0005543225 certmonger[38530]: /gA7ydOsEdFDOFSDXc05KtR0hCJI2x81DC2UVSuqrc9J556vqw2UANR+lhcKYUCg Dec 3 08:03:16 np0005543225 certmonger[38530]: SKr34yOgnEfNucKAkotv2SKXouCYlnML52ln/CaWZWUM/JHVnM6yifSP22Ns6UW1 Dec 3 08:03:16 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:16 np0005543225 certmonger[38530]: " Dec 3 08:03:16 np0005543225 certmonger[40447]: 2025-12-03 08:03:16 [40447] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:16 np0005543225 certmonger[40447]: MIIFbDCCA9SgAwIBAgIBKzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:16 np0005543225 certmonger[40447]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:16 np0005543225 certmonger[40447]: MDMxNVoXDTI3MTIwNDA4MDMxNVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 08:03:16 np0005543225 certmonger[40447]: BAMMHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 08:03:16 np0005543225 certmonger[40447]: AQEBBQADggEPADCCAQoCggEBAMGrNr/tZySv7gEyiXSN08jVy5bnZryFNiRYISur Dec 3 08:03:16 np0005543225 certmonger[40447]: 9rMrYHAkvWUxtR2TOGPUy1o9vm8fmZUj89eBD17cxrJYJ10+vLLB8WPWjLbUZdDq Dec 3 08:03:16 np0005543225 certmonger[40447]: /g6RyFyJdUgQW3qF6GlnWVKKgiBnv3WOBvqkUZeE139zpm51V8jyrKOzJ7/fV13H Dec 3 08:03:16 np0005543225 certmonger[40447]: 4CS7bV97yOnc9gsydptuvPX4UKsYLS9MfaruAe7wNzmGzsoxp3I6P6lqK8g/kPoo Dec 3 08:03:16 np0005543225 certmonger[40447]: Hdrs0+6gNXyNFoiPu36ETWAYTovdZfocd3IHnYiAainKm2MSB5N/okFt4oQyB9nZ Dec 3 08:03:16 np0005543225 certmonger[40447]: Bcd20LSplLwcugN5xsJIoztI9vw1UkslSVgYlQ+fD2y30/0CAwEAAaOCAgAwggH8 Dec 3 08:03:16 np0005543225 certmonger[40447]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 08:03:16 np0005543225 certmonger[40447]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 08:03:16 np0005543225 certmonger[40447]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 08:03:16 np0005543225 certmonger[40447]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 08:03:16 np0005543225 certmonger[40447]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 08:03:16 np0005543225 certmonger[40447]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFAIqB+npO7ALjzGpNd+5Yb+rOrl9 Dec 3 08:03:16 np0005543225 certmonger[40447]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdIIb Dec 3 08:03:16 np0005543225 certmonger[40447]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Dec 3 08:03:16 np0005543225 certmonger[40447]: cm94eS9ucDAwMDU1NDMyMjUuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Dec 3 08:03:16 np0005543225 certmonger[40447]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Dec 3 08:03:16 np0005543225 certmonger[40447]: MDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Dec 3 08:03:16 np0005543225 certmonger[40447]: d8Wd/AuibWN2rDcyr5DKIDmdqmxFgfZjh8IDaCIZTPrflhnF+WGnLLbc4+S5UHzt Dec 3 08:03:16 np0005543225 certmonger[40447]: LaDvRzr/ek3WZDbSkWXCmzdlQQPMs+TzFQB5u4RSk8CltlhYx7EJ77l1U6fE/yfL Dec 3 08:03:16 np0005543225 certmonger[40447]: 5us8vInG4UVCORwhOK7KXU5eNolGEmhXT6iSX5EYMkYYeCURMFK46Aao3a9OBv7g Dec 3 08:03:16 np0005543225 certmonger[40447]: JjbwszusOzlRQwSXDKGFyaYsYvJSlCPzAL0fU2amjrUJkS6bjqh6W2P+JGc9m078 Dec 3 08:03:16 np0005543225 certmonger[40447]: rxk7aNv9x/fUXwOT5XbxapK0kbS3SeAiYpXorWh3Vu3GyefLchq8hdFWxXGPVzDf Dec 3 08:03:16 np0005543225 certmonger[40447]: CaNN/U5kyrC+cACSMm4XiziXP6iivYJCPLrNown5qR9b9s1MgBnd/m69eoyU5QRl Dec 3 08:03:16 np0005543225 certmonger[40447]: /gA7ydOsEdFDOFSDXc05KtR0hCJI2x81DC2UVSuqrc9J556vqw2UANR+lhcKYUCg Dec 3 08:03:16 np0005543225 certmonger[40447]: SKr34yOgnEfNucKAkotv2SKXouCYlnML52ln/CaWZWUM/JHVnM6yifSP22Ns6UW1 Dec 3 08:03:16 np0005543225 certmonger[40447]: -----END CERTIFICATE----- Dec 3 08:03:16 np0005543225 certmonger[40447]: ". Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Certificate submission still ongoing. Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Certificate submission postprocessing complete. Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Child status = 0. Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Child output: Dec 3 08:03:16 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:16 np0005543225 certmonger[38530]: " Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:16 np0005543225 certmonger[38530]: MIIFbDCCA9SgAwIBAgIBKzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:16 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:16 np0005543225 certmonger[38530]: MDMxNVoXDTI3MTIwNDA4MDMxNVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 08:03:16 np0005543225 certmonger[38530]: BAMMHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 08:03:16 np0005543225 certmonger[38530]: AQEBBQADggEPADCCAQoCggEBAMGrNr/tZySv7gEyiXSN08jVy5bnZryFNiRYISur Dec 3 08:03:16 np0005543225 certmonger[38530]: 9rMrYHAkvWUxtR2TOGPUy1o9vm8fmZUj89eBD17cxrJYJ10+vLLB8WPWjLbUZdDq Dec 3 08:03:16 np0005543225 certmonger[38530]: /g6RyFyJdUgQW3qF6GlnWVKKgiBnv3WOBvqkUZeE139zpm51V8jyrKOzJ7/fV13H Dec 3 08:03:16 np0005543225 certmonger[38530]: 4CS7bV97yOnc9gsydptuvPX4UKsYLS9MfaruAe7wNzmGzsoxp3I6P6lqK8g/kPoo Dec 3 08:03:16 np0005543225 certmonger[38530]: Hdrs0+6gNXyNFoiPu36ETWAYTovdZfocd3IHnYiAainKm2MSB5N/okFt4oQyB9nZ Dec 3 08:03:16 np0005543225 certmonger[38530]: Bcd20LSplLwcugN5xsJIoztI9vw1UkslSVgYlQ+fD2y30/0CAwEAAaOCAgAwggH8 Dec 3 08:03:16 np0005543225 certmonger[38530]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 08:03:16 np0005543225 certmonger[38530]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 08:03:16 np0005543225 certmonger[38530]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 08:03:16 np0005543225 certmonger[38530]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 08:03:16 np0005543225 certmonger[38530]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 08:03:16 np0005543225 certmonger[38530]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFAIqB+npO7ALjzGpNd+5Yb+rOrl9 Dec 3 08:03:16 np0005543225 certmonger[38530]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdIIb Dec 3 08:03:16 np0005543225 certmonger[38530]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Dec 3 08:03:16 np0005543225 certmonger[38530]: cm94eS9ucDAwMDU1NDMyMjUuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Dec 3 08:03:16 np0005543225 certmonger[38530]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Dec 3 08:03:16 np0005543225 certmonger[38530]: MDAwNTU0MzIyNS5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Dec 3 08:03:16 np0005543225 certmonger[38530]: d8Wd/AuibWN2rDcyr5DKIDmdqmxFgfZjh8IDaCIZTPrflhnF+WGnLLbc4+S5UHzt Dec 3 08:03:16 np0005543225 certmonger[38530]: LaDvRzr/ek3WZDbSkWXCmzdlQQPMs+TzFQB5u4RSk8CltlhYx7EJ77l1U6fE/yfL Dec 3 08:03:16 np0005543225 certmonger[38530]: 5us8vInG4UVCORwhOK7KXU5eNolGEmhXT6iSX5EYMkYYeCURMFK46Aao3a9OBv7g Dec 3 08:03:16 np0005543225 certmonger[38530]: JjbwszusOzlRQwSXDKGFyaYsYvJSlCPzAL0fU2amjrUJkS6bjqh6W2P+JGc9m078 Dec 3 08:03:16 np0005543225 certmonger[38530]: rxk7aNv9x/fUXwOT5XbxapK0kbS3SeAiYpXorWh3Vu3GyefLchq8hdFWxXGPVzDf Dec 3 08:03:16 np0005543225 certmonger[38530]: CaNN/U5kyrC+cACSMm4XiziXP6iivYJCPLrNown5qR9b9s1MgBnd/m69eoyU5QRl Dec 3 08:03:16 np0005543225 certmonger[38530]: /gA7ydOsEdFDOFSDXc05KtR0hCJI2x81DC2UVSuqrc9J556vqw2UANR+lhcKYUCg Dec 3 08:03:16 np0005543225 certmonger[38530]: SKr34yOgnEfNucKAkotv2SKXouCYlnML52ln/CaWZWUM/JHVnM6yifSP22Ns6UW1 Dec 3 08:03:16 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:16 np0005543225 certmonger[38530]: ". Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] No hooks set for pre-save command. Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:16 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543225 certmonger[40774]: Certificate in file "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" issued by CA and saved. Dec 3 08:03:16 np0005543225 certmonger[38530]: 2025-12-03 08:03:16 [38530] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:17 np0005543225 python3[40790]: ansible-certificate_request Invoked with name=haproxy-storage-cert dns=['np0005543225.storage.ooo.test', 'overcloud.storage.ooo.test'] principal=['haproxy/np0005543225.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012cp "/etc/pki/tls/private/haproxy-storage-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:17 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.storage.ooo.test" for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.storage.ooo.test Dec 3 08:03:17 np0005543225 certmonger[40800]: overcloud.storage.ooo.test Dec 3 08:03:17 np0005543225 certmonger[40800]: " for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005543225.storage.ooo.test@OOO.TEST Dec 3 08:03:17 np0005543225 certmonger[40800]: " for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:17 np0005543225 certmonger[40800]: MIID5DCCAswCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29v Dec 3 08:03:17 np0005543225 certmonger[40800]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQD1MkGjoIMiHElC Dec 3 08:03:17 np0005543225 certmonger[40800]: icUMaFJyTTqMDlJYlWutb9TPOP5a7NSrCprF35oyEblVG9kvs9YYaO0ZD+nTXXzQ Dec 3 08:03:17 np0005543225 certmonger[40800]: BS/4TLqhpZeRdNFPjEl02EfoSM0CHnC+0NLRaydCGNO9IEwiah6+uhvltimrfAcE Dec 3 08:03:17 np0005543225 certmonger[40800]: 2ODNJgMBTiaR7QHt3ywY/y7vdl/B1Q+ma9dJMTHwMver8qWFHVvDTz9gCvsjbG/B Dec 3 08:03:17 np0005543225 certmonger[40800]: 5tTPHb9aeh1zYwmCD6yJYtXa05LCDXHTaPVCwQAsKHdpSH87ZbriUYpk0nUg0qsQ Dec 3 08:03:17 np0005543225 certmonger[40800]: 2G/+CmXH2Tift7GZVG6dqtcuVXQdGM8+3PgJqHl03+eADIsCjTzWq9oDP2t5R0wr Dec 3 08:03:17 np0005543225 certmonger[40800]: CWcYyGvFAgMBAAGgggF1MCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADIAMAAz Dec 3 08:03:17 np0005543225 certmonger[40800]: ADAAOAAwADMAMQA3MIIBRAYJKoZIhvcNAQkOMYIBNTCCATEwCwYDVR0PBAQDAgWg Dec 3 08:03:17 np0005543225 certmonger[40800]: MIHVBgNVHREEgc0wgcqCHW5wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0ghpv Dec 3 08:03:17 np0005543225 certmonger[40800]: dmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEEAYI3FAIDoDAMLmhhcHJv Dec 3 08:03:17 np0005543225 certmonger[40800]: eHkvbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3RAT09PLlRFU1SgTQYGKwYB Dec 3 08:03:17 np0005543225 certmonger[40800]: BQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgbB2hhcHJveHkbHW5wMDAw Dec 3 08:03:17 np0005543225 certmonger[40800]: NTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr Dec 3 08:03:17 np0005543225 certmonger[40800]: BgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQ+zVOgdzpK+HN+ABPFSVDa Dec 3 08:03:17 np0005543225 certmonger[40800]: KD/+QzANBgkqhkiG9w0BAQsFAAOCAQEACYoo6pulv8TqGxexNnwhtKCBX78njqpD Dec 3 08:03:17 np0005543225 certmonger[40800]: rQnqvz0cOFcWQQYO8gVhIeU4yGl6aqAaMDhDQkRCFLaYbatjdT29IXo/rgqh54Kq Dec 3 08:03:17 np0005543225 certmonger[40800]: vY3RYVnqgdcYLsCNQ3WvpcKcmaCyE6rhsNucXrtIWIPlivfYQc2G9Z4XA2k5gRcx Dec 3 08:03:17 np0005543225 certmonger[40800]: cSAPiAgUy1Rpkw8UClxJLyGwZzqW4B0z2IdBBSERa17ZYB3UgeMhpFyKLIv5hARE Dec 3 08:03:17 np0005543225 certmonger[40800]: JxpWTJCIjtUQQwWl7ZbBnD+ZuA9ZSpO+JTX7zQJyOLjXoJN1Xr+y2tvw5M3IVO1T Dec 3 08:03:17 np0005543225 certmonger[40800]: 4gxCZglkjtA3rxOr3SsXv09vY4XGTe5Hbx4wc+08gufikYevgq8wwA== Dec 3 08:03:17 np0005543225 certmonger[40800]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:17 np0005543225 certmonger[40800]: " for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA9TJBo6CDIhxJQonFDGhSck06jA5SWJVrrW/Uzzj+WuzUqwqaxd+aMhG5VRvZL7PWGGjtGQ/p01180AUv+Ey6oaWXkXTRT4xJdNhH6EjNAh5wvtDS0WsnQhjTvSBMImoevrob5bYpq3wHBNjgzSYDAU4mke0B7d8sGP8u73ZfwdUPpmvXSTEx8DL3q/KlhR1bw08/YAr7I2xvwebUzx2/Wnodc2MJgg+siWLV2tOSwg1x02j1QsEALCh3aUh/O2W64lGKZNJ1INKrENhv/gplx9k4n7exmVRunarXLlV0HRjPPtz4Cah5dN/ngAyLAo081qvaAz9reUdMKwlnGMhrxQIDAQAB" for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:17 np0005543225 certmonger[40800]: 2025-12-03 08:03:17 [40800] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:17 np0005543225 certmonger[38530]: 2025-12-03 08:03:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:17 np0005543225 certmonger[40800]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:18 np0005543225 certmonger[40800]: Certificate: "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" Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Certificate submission still ongoing. Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Certificate submission attempt complete. Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Child status = 0. Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Child output: Dec 3 08:03:18 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:18 np0005543225 certmonger[38530]: MIIFZzCCA8+gAwIBAgIBLTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:18 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:18 np0005543225 certmonger[38530]: MDMxOFoXDTI3MTIwNDA4MDMxOFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 08:03:18 np0005543225 certmonger[38530]: BAMMHW5wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 08:03:18 np0005543225 certmonger[38530]: AQEFAAOCAQ8AMIIBCgKCAQEA9TJBo6CDIhxJQonFDGhSck06jA5SWJVrrW/Uzzj+ Dec 3 08:03:18 np0005543225 certmonger[38530]: WuzUqwqaxd+aMhG5VRvZL7PWGGjtGQ/p01180AUv+Ey6oaWXkXTRT4xJdNhH6EjN Dec 3 08:03:18 np0005543225 certmonger[38530]: Ah5wvtDS0WsnQhjTvSBMImoevrob5bYpq3wHBNjgzSYDAU4mke0B7d8sGP8u73Zf Dec 3 08:03:18 np0005543225 certmonger[38530]: wdUPpmvXSTEx8DL3q/KlhR1bw08/YAr7I2xvwebUzx2/Wnodc2MJgg+siWLV2tOS Dec 3 08:03:18 np0005543225 certmonger[38530]: wg1x02j1QsEALCh3aUh/O2W64lGKZNJ1INKrENhv/gplx9k4n7exmVRunarXLlV0 Dec 3 08:03:18 np0005543225 certmonger[38530]: HRjPPtz4Cah5dN/ngAyLAo081qvaAz9reUdMKwlnGMhrxQIDAQABo4IB/DCCAfgw Dec 3 08:03:18 np0005543225 certmonger[38530]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 08:03:18 np0005543225 certmonger[38530]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 08:03:18 np0005543225 certmonger[38530]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 08:03:18 np0005543225 certmonger[38530]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 08:03:18 np0005543225 certmonger[38530]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 08:03:18 np0005543225 certmonger[38530]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU92kKOr4YTQP77YlOY6QECaTgma0w Dec 3 08:03:18 np0005543225 certmonger[38530]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3SCGm92 Dec 3 08:03:18 np0005543225 certmonger[38530]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Dec 3 08:03:18 np0005543225 certmonger[38530]: eS9ucDAwMDU1NDMyMjUuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Dec 3 08:03:18 np0005543225 certmonger[38530]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Dec 3 08:03:18 np0005543225 certmonger[38530]: NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAFmfG7gE Dec 3 08:03:18 np0005543225 certmonger[38530]: voUbz8vJNFMDVhe/WE2SiRT+oGuWDaj6dnMCpXe7PMQ1a34d0efLn26ZjhuWi6fL Dec 3 08:03:18 np0005543225 certmonger[38530]: D6A6xY2eSXv09/VI29Gp5myj/Gb56vnSGvTBgha3VSZTueKBiXoYo6tWzmAyWEnj Dec 3 08:03:18 np0005543225 certmonger[38530]: kaqC1/AGtjQBJXsvhIn4JRkGF2zr1BQ0EEMjhkL+UrfZ3R/Mk3ZxBNjfoi6RNPgB Dec 3 08:03:18 np0005543225 certmonger[38530]: PARLZWt4QKJtE5bglXWMV7YLaoKrA9Oxzv2vyHdLl5BQcNqQ68AX4kdGGvC+pJ7I Dec 3 08:03:18 np0005543225 certmonger[38530]: nkimJ/C9mBz8dSykEgm6Xc+GoWZbgBpibNTq2l4MQRvVfEXeoWQtjd0akVug3DoF Dec 3 08:03:18 np0005543225 certmonger[38530]: RupZb96OxiwS662QSKOWM5GLbvdx3Wvlg6LLsg2KBmqqXwpxrh0mH/a6IvamaHvF Dec 3 08:03:18 np0005543225 certmonger[38530]: MRJJf2/x223WyZEBwEHNahv20UWo5jrQ5cQPYVCTVTXNeAVSAdZUsTgrs0ARyP3D Dec 3 08:03:18 np0005543225 certmonger[38530]: 0/me1OXsWf/Bao8VDkckVrzU0SUCkwxhg8dAf5Z5RbDLb01FZhEAbgk4+g== Dec 3 08:03:18 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:18 np0005543225 certmonger[38530]: " Dec 3 08:03:18 np0005543225 certmonger[40802]: 2025-12-03 08:03:18 [40802] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:18 np0005543225 certmonger[40802]: MIIFZzCCA8+gAwIBAgIBLTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:18 np0005543225 certmonger[40802]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:18 np0005543225 certmonger[40802]: MDMxOFoXDTI3MTIwNDA4MDMxOFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 08:03:18 np0005543225 certmonger[40802]: BAMMHW5wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 08:03:18 np0005543225 certmonger[40802]: AQEFAAOCAQ8AMIIBCgKCAQEA9TJBo6CDIhxJQonFDGhSck06jA5SWJVrrW/Uzzj+ Dec 3 08:03:18 np0005543225 certmonger[40802]: WuzUqwqaxd+aMhG5VRvZL7PWGGjtGQ/p01180AUv+Ey6oaWXkXTRT4xJdNhH6EjN Dec 3 08:03:18 np0005543225 certmonger[40802]: Ah5wvtDS0WsnQhjTvSBMImoevrob5bYpq3wHBNjgzSYDAU4mke0B7d8sGP8u73Zf Dec 3 08:03:18 np0005543225 certmonger[40802]: wdUPpmvXSTEx8DL3q/KlhR1bw08/YAr7I2xvwebUzx2/Wnodc2MJgg+siWLV2tOS Dec 3 08:03:18 np0005543225 certmonger[40802]: wg1x02j1QsEALCh3aUh/O2W64lGKZNJ1INKrENhv/gplx9k4n7exmVRunarXLlV0 Dec 3 08:03:18 np0005543225 certmonger[40802]: HRjPPtz4Cah5dN/ngAyLAo081qvaAz9reUdMKwlnGMhrxQIDAQABo4IB/DCCAfgw Dec 3 08:03:18 np0005543225 certmonger[40802]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 08:03:18 np0005543225 certmonger[40802]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 08:03:18 np0005543225 certmonger[40802]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 08:03:18 np0005543225 certmonger[40802]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 08:03:18 np0005543225 certmonger[40802]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 08:03:18 np0005543225 certmonger[40802]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU92kKOr4YTQP77YlOY6QECaTgma0w Dec 3 08:03:18 np0005543225 certmonger[40802]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3SCGm92 Dec 3 08:03:18 np0005543225 certmonger[40802]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Dec 3 08:03:18 np0005543225 certmonger[40802]: eS9ucDAwMDU1NDMyMjUuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Dec 3 08:03:18 np0005543225 certmonger[40802]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Dec 3 08:03:18 np0005543225 certmonger[40802]: NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAFmfG7gE Dec 3 08:03:18 np0005543225 certmonger[40802]: voUbz8vJNFMDVhe/WE2SiRT+oGuWDaj6dnMCpXe7PMQ1a34d0efLn26ZjhuWi6fL Dec 3 08:03:18 np0005543225 certmonger[40802]: D6A6xY2eSXv09/VI29Gp5myj/Gb56vnSGvTBgha3VSZTueKBiXoYo6tWzmAyWEnj Dec 3 08:03:18 np0005543225 certmonger[40802]: kaqC1/AGtjQBJXsvhIn4JRkGF2zr1BQ0EEMjhkL+UrfZ3R/Mk3ZxBNjfoi6RNPgB Dec 3 08:03:18 np0005543225 certmonger[40802]: PARLZWt4QKJtE5bglXWMV7YLaoKrA9Oxzv2vyHdLl5BQcNqQ68AX4kdGGvC+pJ7I Dec 3 08:03:18 np0005543225 certmonger[40802]: nkimJ/C9mBz8dSykEgm6Xc+GoWZbgBpibNTq2l4MQRvVfEXeoWQtjd0akVug3DoF Dec 3 08:03:18 np0005543225 certmonger[40802]: RupZb96OxiwS662QSKOWM5GLbvdx3Wvlg6LLsg2KBmqqXwpxrh0mH/a6IvamaHvF Dec 3 08:03:18 np0005543225 certmonger[40802]: MRJJf2/x223WyZEBwEHNahv20UWo5jrQ5cQPYVCTVTXNeAVSAdZUsTgrs0ARyP3D Dec 3 08:03:18 np0005543225 certmonger[40802]: 0/me1OXsWf/Bao8VDkckVrzU0SUCkwxhg8dAf5Z5RbDLb01FZhEAbgk4+g== Dec 3 08:03:18 np0005543225 certmonger[40802]: -----END CERTIFICATE----- Dec 3 08:03:18 np0005543225 certmonger[40802]: ". Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Certificate submission still ongoing. Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Certificate submission postprocessing complete. Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Child status = 0. Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Child output: Dec 3 08:03:18 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n0/me1OXsWf/Bao8VDkckVrzU0SUCkwxhg8dAf5Z5RbDLb01FZhEAbgk4+g==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:18 np0005543225 certmonger[38530]: " Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:18 np0005543225 certmonger[38530]: MIIFZzCCA8+gAwIBAgIBLTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:18 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:18 np0005543225 certmonger[38530]: MDMxOFoXDTI3MTIwNDA4MDMxOFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 08:03:18 np0005543225 certmonger[38530]: BAMMHW5wMDAwNTU0MzIyNS5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 08:03:18 np0005543225 certmonger[38530]: AQEFAAOCAQ8AMIIBCgKCAQEA9TJBo6CDIhxJQonFDGhSck06jA5SWJVrrW/Uzzj+ Dec 3 08:03:18 np0005543225 certmonger[38530]: WuzUqwqaxd+aMhG5VRvZL7PWGGjtGQ/p01180AUv+Ey6oaWXkXTRT4xJdNhH6EjN Dec 3 08:03:18 np0005543225 certmonger[38530]: Ah5wvtDS0WsnQhjTvSBMImoevrob5bYpq3wHBNjgzSYDAU4mke0B7d8sGP8u73Zf Dec 3 08:03:18 np0005543225 certmonger[38530]: wdUPpmvXSTEx8DL3q/KlhR1bw08/YAr7I2xvwebUzx2/Wnodc2MJgg+siWLV2tOS Dec 3 08:03:18 np0005543225 certmonger[38530]: wg1x02j1QsEALCh3aUh/O2W64lGKZNJ1INKrENhv/gplx9k4n7exmVRunarXLlV0 Dec 3 08:03:18 np0005543225 certmonger[38530]: HRjPPtz4Cah5dN/ngAyLAo081qvaAz9reUdMKwlnGMhrxQIDAQABo4IB/DCCAfgw Dec 3 08:03:18 np0005543225 certmonger[38530]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 08:03:18 np0005543225 certmonger[38530]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 08:03:18 np0005543225 certmonger[38530]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 08:03:18 np0005543225 certmonger[38530]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 08:03:18 np0005543225 certmonger[38530]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 08:03:18 np0005543225 certmonger[38530]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU92kKOr4YTQP77YlOY6QECaTgma0w Dec 3 08:03:18 np0005543225 certmonger[38530]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3SCGm92 Dec 3 08:03:18 np0005543225 certmonger[38530]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Dec 3 08:03:18 np0005543225 certmonger[38530]: eS9ucDAwMDU1NDMyMjUuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Dec 3 08:03:18 np0005543225 certmonger[38530]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Dec 3 08:03:18 np0005543225 certmonger[38530]: NTQzMjI1LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAFmfG7gE Dec 3 08:03:18 np0005543225 certmonger[38530]: voUbz8vJNFMDVhe/WE2SiRT+oGuWDaj6dnMCpXe7PMQ1a34d0efLn26ZjhuWi6fL Dec 3 08:03:18 np0005543225 certmonger[38530]: D6A6xY2eSXv09/VI29Gp5myj/Gb56vnSGvTBgha3VSZTueKBiXoYo6tWzmAyWEnj Dec 3 08:03:18 np0005543225 certmonger[38530]: kaqC1/AGtjQBJXsvhIn4JRkGF2zr1BQ0EEMjhkL+UrfZ3R/Mk3ZxBNjfoi6RNPgB Dec 3 08:03:18 np0005543225 certmonger[38530]: PARLZWt4QKJtE5bglXWMV7YLaoKrA9Oxzv2vyHdLl5BQcNqQ68AX4kdGGvC+pJ7I Dec 3 08:03:18 np0005543225 certmonger[38530]: nkimJ/C9mBz8dSykEgm6Xc+GoWZbgBpibNTq2l4MQRvVfEXeoWQtjd0akVug3DoF Dec 3 08:03:18 np0005543225 certmonger[38530]: RupZb96OxiwS662QSKOWM5GLbvdx3Wvlg6LLsg2KBmqqXwpxrh0mH/a6IvamaHvF Dec 3 08:03:18 np0005543225 certmonger[38530]: MRJJf2/x223WyZEBwEHNahv20UWo5jrQ5cQPYVCTVTXNeAVSAdZUsTgrs0ARyP3D Dec 3 08:03:18 np0005543225 certmonger[38530]: 0/me1OXsWf/Bao8VDkckVrzU0SUCkwxhg8dAf5Z5RbDLb01FZhEAbgk4+g== Dec 3 08:03:18 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:18 np0005543225 certmonger[38530]: ". Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] No hooks set for pre-save command. Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:18 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:18 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:18 np0005543225 certmonger[40871]: Certificate in file "/etc/pki/tls/certs/haproxy-storage-cert.crt" issued by CA and saved. Dec 3 08:03:18 np0005543225 certmonger[38530]: 2025-12-03 08:03:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080317 Dec 3 08:03:19 np0005543225 python3[40887]: ansible-certificate_request Invoked with name=haproxy-storage_mgmt-cert dns=['np0005543225.storagemgmt.ooo.test', 'overcloud.storagemgmt.ooo.test'] principal=['haproxy/np0005543225.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012cp "/etc/pki/tls/private/haproxy-storage_mgmt-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.storagemgmt.ooo.test" for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.storagemgmt.ooo.test Dec 3 08:03:19 np0005543225 certmonger[40897]: overcloud.storagemgmt.ooo.test Dec 3 08:03:19 np0005543225 certmonger[40897]: " for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005543225.storagemgmt.ooo.test@OOO.TEST Dec 3 08:03:19 np0005543225 certmonger[40897]: " for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:19 np0005543225 certmonger[40897]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LnN0b3JhZ2VtZ210 Dec 3 08:03:19 np0005543225 certmonger[40897]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzzKKXxr/ Dec 3 08:03:19 np0005543225 certmonger[40897]: JkFzHlemXsAhDLYELXiUFHeMj6xgWbGU2W6p3IU1KVT78Xw8gUkZIXt/ZqLZmnBJ Dec 3 08:03:19 np0005543225 certmonger[40897]: /7YV7V8tSe+Ftwb3KHCclsPED1S2X/farPtTNFx3muplkFLm2sbiHpk2Ed8iO+JU Dec 3 08:03:19 np0005543225 certmonger[40897]: /WV+tXxtCfD6+XByj0Ho136CuNMhd/CKTY4H9Qi4058d5YKisWuXg+DXaQPpHfVH Dec 3 08:03:19 np0005543225 certmonger[40897]: HPNhx/xtt4qa3/Fa9hc6SMUJJkTcH4kyqLmRf6y+iRavgrIvLcBiQ9jFFbAfrcET Dec 3 08:03:19 np0005543225 certmonger[40897]: L6E1vOH5xGIWxgxHL7ojG1ITz+PDshqW6bLPpGqEBEZWLRr0UiY7r3pee81WuXTi Dec 3 08:03:19 np0005543225 certmonger[40897]: 8xazeFa8CToyhwIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:03:19 np0005543225 certmonger[40897]: ADAAMwAwADgAMAAzADEAOTCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Dec 3 08:03:19 np0005543225 certmonger[40897]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29v Dec 3 08:03:19 np0005543225 certmonger[40897]: LnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28udGVzdKBCBgorBgEEAYI3 Dec 3 08:03:19 np0005543225 certmonger[40897]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NTQzMjI1LnN0b3JhZ2VtZ210Lm9vby50ZXN0 Dec 3 08:03:19 np0005543225 certmonger[40897]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Dec 3 08:03:19 np0005543225 certmonger[40897]: GwdoYXByb3h5GyFucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29vLnRlc3QwHQYD Dec 3 08:03:19 np0005543225 certmonger[40897]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Dec 3 08:03:19 np0005543225 certmonger[40897]: BBYEFKuVjFrFYwMs3kcDWeq1KyK6v1SyMA0GCSqGSIb3DQEBCwUAA4IBAQBbIc7u Dec 3 08:03:19 np0005543225 certmonger[40897]: qLyOlEydqiCf3lISq7sGUsJbiCzAjTYr096X01fdazOczgtZ5+OMNdOTD5bsFUvV Dec 3 08:03:19 np0005543225 certmonger[40897]: Sx0RZEoK9Ab1JA71Uc74Vga1+ze/LAo1sI6UspQ+gAbAwNwm2jkXe47vmGBxrsAA Dec 3 08:03:19 np0005543225 certmonger[40897]: yTXX//bxmfT0yOFTaduzhsFOhN7zI8jAwLO9SHuNeIU/nrWFCwPtMTPk20pkse2z Dec 3 08:03:19 np0005543225 certmonger[40897]: CjrLPoZI5OZNH9Mx3yTHyGBKDYbFBJXWHQ7SuNSmA2C14R2P2vvgxWOADnfBGBas Dec 3 08:03:19 np0005543225 certmonger[40897]: BHdiE2lM5Wy3Qr+nVRs/vruxeRv4kefirHmQicZC0RN8RPQS5UdJ8ZKm9m2PYipX Dec 3 08:03:19 np0005543225 certmonger[40897]: FAMJ0ZynPwnf9diL Dec 3 08:03:19 np0005543225 certmonger[40897]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:19 np0005543225 certmonger[40897]: " for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzzKKXxr/JkFzHlemXsAhDLYELXiUFHeMj6xgWbGU2W6p3IU1KVT78Xw8gUkZIXt/ZqLZmnBJ/7YV7V8tSe+Ftwb3KHCclsPED1S2X/farPtTNFx3muplkFLm2sbiHpk2Ed8iO+JU/WV+tXxtCfD6+XByj0Ho136CuNMhd/CKTY4H9Qi4058d5YKisWuXg+DXaQPpHfVHHPNhx/xtt4qa3/Fa9hc6SMUJJkTcH4kyqLmRf6y+iRavgrIvLcBiQ9jFFbAfrcETL6E1vOH5xGIWxgxHL7ojG1ITz+PDshqW6bLPpGqEBEZWLRr0UiY7r3pee81WuXTi8xazeFa8CToyhwIDAQAB" for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:19 np0005543225 certmonger[40897]: 2025-12-03 08:03:19 [40897] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:19 np0005543225 certmonger[38530]: 2025-12-03 08:03:19 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543225 certmonger[40897]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:20 np0005543225 certmonger[40897]: Certificate: "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" Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Certificate submission still ongoing. Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Certificate submission attempt complete. Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Child status = 0. Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Child output: Dec 3 08:03:20 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:20 np0005543225 certmonger[38530]: MIIFezCCA+OgAwIBAgIBLzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:20 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:20 np0005543225 certmonger[38530]: MDMyMFoXDTI3MTIwNDA4MDMyMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:20 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:20 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAM8yil8a/yZBcx5Xpl7AIQy2BC14lBR3jI+s Dec 3 08:03:20 np0005543225 certmonger[38530]: YFmxlNluqdyFNSlU+/F8PIFJGSF7f2ai2ZpwSf+2Fe1fLUnvhbcG9yhwnJbDxA9U Dec 3 08:03:20 np0005543225 certmonger[38530]: tl/32qz7UzRcd5rqZZBS5trG4h6ZNhHfIjviVP1lfrV8bQnw+vlwco9B6Nd+grjT Dec 3 08:03:20 np0005543225 certmonger[38530]: IXfwik2OB/UIuNOfHeWCorFrl4Pg12kD6R31RxzzYcf8bbeKmt/xWvYXOkjFCSZE Dec 3 08:03:20 np0005543225 certmonger[38530]: 3B+JMqi5kX+svokWr4KyLy3AYkPYxRWwH63BEy+hNbzh+cRiFsYMRy+6IxtSE8/j Dec 3 08:03:20 np0005543225 certmonger[38530]: w7Ialumyz6RqhARGVi0a9FImO696XnvNVrl04vMWs3hWvAk6MocCAwEAAaOCAgww Dec 3 08:03:20 np0005543225 certmonger[38530]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:20 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:20 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:20 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:20 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:20 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLcDj3etekJxTrsB1ieSSNgJ Dec 3 08:03:20 np0005543225 certmonger[38530]: LYWUMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28u Dec 3 08:03:20 np0005543225 certmonger[38530]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:20 np0005543225 certmonger[38530]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29vLnRlc3RA Dec 3 08:03:20 np0005543225 certmonger[38530]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:20 np0005543225 certmonger[38530]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Dec 3 08:03:20 np0005543225 certmonger[38530]: hkiG9w0BAQsFAAOCAYEAOX4gGdDtRPdL8EgrA41T39rsgO9MK2cgBACUtfGgO5u0 Dec 3 08:03:20 np0005543225 certmonger[38530]: v6ygI9FXkSjXMrxUNEPY3Xc4o+nlovWNE4MhTgCin0hqyItBRAU8I6vkRcCVtx+S Dec 3 08:03:20 np0005543225 certmonger[38530]: Ysi01wY5rR6YhL700FdwjVCq0m3Hw79C2XACwdm5f8E9+vG4gq67Gt+CAXaFH9pB Dec 3 08:03:20 np0005543225 certmonger[38530]: fQSjdVOIOdX1vgqbhkFduGRSKxI3BEw9sZ3RGUMnDLepiqOyq3u46U571OsXbxlh Dec 3 08:03:20 np0005543225 certmonger[38530]: ReJ7/Der1kDWCrPmi1ju8f5s8/AFxEvFd1oy1l+VDTZj5XP/lBvwCszha+g9ibwk Dec 3 08:03:20 np0005543225 certmonger[38530]: 669N619ItZ5/jgrxLE4FqEN9rVluJJlR/m9Dl/RFAe1JqsmcRioBNLwXil3mcXrZ Dec 3 08:03:20 np0005543225 certmonger[38530]: bPvPUZXmIYtRbsUp0scvFA8Wylz2dQAPVQkND+Mv/fia3KNhVG+mG4L9Bt99Cw2O Dec 3 08:03:20 np0005543225 certmonger[38530]: ZZQhTSA6L5NVIF/8TGY5wM/jKkkfYbOvdXCoY/acthhwciFGiKhQkMdRCtyXQ8PP Dec 3 08:03:20 np0005543225 certmonger[38530]: Ag8kXDnv876jO2WAov/B Dec 3 08:03:20 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:20 np0005543225 certmonger[38530]: " Dec 3 08:03:20 np0005543225 certmonger[40899]: 2025-12-03 08:03:20 [40899] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:20 np0005543225 certmonger[40899]: MIIFezCCA+OgAwIBAgIBLzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:20 np0005543225 certmonger[40899]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:20 np0005543225 certmonger[40899]: MDMyMFoXDTI3MTIwNDA4MDMyMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:20 np0005543225 certmonger[40899]: BAMMIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:20 np0005543225 certmonger[40899]: hvcNAQEBBQADggEPADCCAQoCggEBAM8yil8a/yZBcx5Xpl7AIQy2BC14lBR3jI+s Dec 3 08:03:20 np0005543225 certmonger[40899]: YFmxlNluqdyFNSlU+/F8PIFJGSF7f2ai2ZpwSf+2Fe1fLUnvhbcG9yhwnJbDxA9U Dec 3 08:03:20 np0005543225 certmonger[40899]: tl/32qz7UzRcd5rqZZBS5trG4h6ZNhHfIjviVP1lfrV8bQnw+vlwco9B6Nd+grjT Dec 3 08:03:20 np0005543225 certmonger[40899]: IXfwik2OB/UIuNOfHeWCorFrl4Pg12kD6R31RxzzYcf8bbeKmt/xWvYXOkjFCSZE Dec 3 08:03:20 np0005543225 certmonger[40899]: 3B+JMqi5kX+svokWr4KyLy3AYkPYxRWwH63BEy+hNbzh+cRiFsYMRy+6IxtSE8/j Dec 3 08:03:20 np0005543225 certmonger[40899]: w7Ialumyz6RqhARGVi0a9FImO696XnvNVrl04vMWs3hWvAk6MocCAwEAAaOCAgww Dec 3 08:03:20 np0005543225 certmonger[40899]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:20 np0005543225 certmonger[40899]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:20 np0005543225 certmonger[40899]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:20 np0005543225 certmonger[40899]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:20 np0005543225 certmonger[40899]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:20 np0005543225 certmonger[40899]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLcDj3etekJxTrsB1ieSSNgJ Dec 3 08:03:20 np0005543225 certmonger[40899]: LYWUMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28u Dec 3 08:03:20 np0005543225 certmonger[40899]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:20 np0005543225 certmonger[40899]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29vLnRlc3RA Dec 3 08:03:20 np0005543225 certmonger[40899]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:20 np0005543225 certmonger[40899]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Dec 3 08:03:20 np0005543225 certmonger[40899]: hkiG9w0BAQsFAAOCAYEAOX4gGdDtRPdL8EgrA41T39rsgO9MK2cgBACUtfGgO5u0 Dec 3 08:03:20 np0005543225 certmonger[40899]: v6ygI9FXkSjXMrxUNEPY3Xc4o+nlovWNE4MhTgCin0hqyItBRAU8I6vkRcCVtx+S Dec 3 08:03:20 np0005543225 certmonger[40899]: Ysi01wY5rR6YhL700FdwjVCq0m3Hw79C2XACwdm5f8E9+vG4gq67Gt+CAXaFH9pB Dec 3 08:03:20 np0005543225 certmonger[40899]: fQSjdVOIOdX1vgqbhkFduGRSKxI3BEw9sZ3RGUMnDLepiqOyq3u46U571OsXbxlh Dec 3 08:03:20 np0005543225 certmonger[40899]: ReJ7/Der1kDWCrPmi1ju8f5s8/AFxEvFd1oy1l+VDTZj5XP/lBvwCszha+g9ibwk Dec 3 08:03:20 np0005543225 certmonger[40899]: 669N619ItZ5/jgrxLE4FqEN9rVluJJlR/m9Dl/RFAe1JqsmcRioBNLwXil3mcXrZ Dec 3 08:03:20 np0005543225 certmonger[40899]: bPvPUZXmIYtRbsUp0scvFA8Wylz2dQAPVQkND+Mv/fia3KNhVG+mG4L9Bt99Cw2O Dec 3 08:03:20 np0005543225 certmonger[40899]: ZZQhTSA6L5NVIF/8TGY5wM/jKkkfYbOvdXCoY/acthhwciFGiKhQkMdRCtyXQ8PP Dec 3 08:03:20 np0005543225 certmonger[40899]: Ag8kXDnv876jO2WAov/B Dec 3 08:03:20 np0005543225 certmonger[40899]: -----END CERTIFICATE----- Dec 3 08:03:20 np0005543225 certmonger[40899]: ". Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Certificate submission still ongoing. Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Certificate submission postprocessing complete. Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Child status = 0. Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Child output: Dec 3 08:03:20 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nAg8kXDnv876jO2WAov/B\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:20 np0005543225 certmonger[38530]: " Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:20 np0005543225 certmonger[38530]: MIIFezCCA+OgAwIBAgIBLzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:20 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:20 np0005543225 certmonger[38530]: MDMyMFoXDTI3MTIwNDA4MDMyMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:20 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:20 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAM8yil8a/yZBcx5Xpl7AIQy2BC14lBR3jI+s Dec 3 08:03:20 np0005543225 certmonger[38530]: YFmxlNluqdyFNSlU+/F8PIFJGSF7f2ai2ZpwSf+2Fe1fLUnvhbcG9yhwnJbDxA9U Dec 3 08:03:20 np0005543225 certmonger[38530]: tl/32qz7UzRcd5rqZZBS5trG4h6ZNhHfIjviVP1lfrV8bQnw+vlwco9B6Nd+grjT Dec 3 08:03:20 np0005543225 certmonger[38530]: IXfwik2OB/UIuNOfHeWCorFrl4Pg12kD6R31RxzzYcf8bbeKmt/xWvYXOkjFCSZE Dec 3 08:03:20 np0005543225 certmonger[38530]: 3B+JMqi5kX+svokWr4KyLy3AYkPYxRWwH63BEy+hNbzh+cRiFsYMRy+6IxtSE8/j Dec 3 08:03:20 np0005543225 certmonger[38530]: w7Ialumyz6RqhARGVi0a9FImO696XnvNVrl04vMWs3hWvAk6MocCAwEAAaOCAgww Dec 3 08:03:20 np0005543225 certmonger[38530]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:20 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:20 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:20 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:20 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:20 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLcDj3etekJxTrsB1ieSSNgJ Dec 3 08:03:20 np0005543225 certmonger[38530]: LYWUMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28u Dec 3 08:03:20 np0005543225 certmonger[38530]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:20 np0005543225 certmonger[38530]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjUuc3RvcmFnZW1nbXQub29vLnRlc3RA Dec 3 08:03:20 np0005543225 certmonger[38530]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:20 np0005543225 certmonger[38530]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNS5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Dec 3 08:03:20 np0005543225 certmonger[38530]: hkiG9w0BAQsFAAOCAYEAOX4gGdDtRPdL8EgrA41T39rsgO9MK2cgBACUtfGgO5u0 Dec 3 08:03:20 np0005543225 certmonger[38530]: v6ygI9FXkSjXMrxUNEPY3Xc4o+nlovWNE4MhTgCin0hqyItBRAU8I6vkRcCVtx+S Dec 3 08:03:20 np0005543225 certmonger[38530]: Ysi01wY5rR6YhL700FdwjVCq0m3Hw79C2XACwdm5f8E9+vG4gq67Gt+CAXaFH9pB Dec 3 08:03:20 np0005543225 certmonger[38530]: fQSjdVOIOdX1vgqbhkFduGRSKxI3BEw9sZ3RGUMnDLepiqOyq3u46U571OsXbxlh Dec 3 08:03:20 np0005543225 certmonger[38530]: ReJ7/Der1kDWCrPmi1ju8f5s8/AFxEvFd1oy1l+VDTZj5XP/lBvwCszha+g9ibwk Dec 3 08:03:20 np0005543225 certmonger[38530]: 669N619ItZ5/jgrxLE4FqEN9rVluJJlR/m9Dl/RFAe1JqsmcRioBNLwXil3mcXrZ Dec 3 08:03:20 np0005543225 certmonger[38530]: bPvPUZXmIYtRbsUp0scvFA8Wylz2dQAPVQkND+Mv/fia3KNhVG+mG4L9Bt99Cw2O Dec 3 08:03:20 np0005543225 certmonger[38530]: ZZQhTSA6L5NVIF/8TGY5wM/jKkkfYbOvdXCoY/acthhwciFGiKhQkMdRCtyXQ8PP Dec 3 08:03:20 np0005543225 certmonger[38530]: Ag8kXDnv876jO2WAov/B Dec 3 08:03:20 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:20 np0005543225 certmonger[38530]: ". Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] No hooks set for pre-save command. Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:20 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:20 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:20 np0005543225 certmonger[40967]: Certificate in file "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" issued by CA and saved. Dec 3 08:03:20 np0005543225 certmonger[38530]: 2025-12-03 08:03:20 [38530] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543225 python3[40983]: ansible-certificate_request Invoked with name=haproxy-internal_api-cert dns=['np0005543225.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['haproxy/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012cp "/etc/pki/tls/private/haproxy-internal_api-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:03:21 np0005543225 certmonger[40993]: overcloud.internalapi.ooo.test Dec 3 08:03:21 np0005543225 certmonger[40993]: " for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:03:21 np0005543225 certmonger[40993]: " for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:21 np0005543225 certmonger[40993]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:03:21 np0005543225 certmonger[40993]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt1+D33nx Dec 3 08:03:21 np0005543225 certmonger[40993]: Nwhfvr6hAaJ5IbivCiUnrKD4gMvweqXV/ojeYu6Oi+kBpJz9LFc0PJNhmVRPscSA Dec 3 08:03:21 np0005543225 certmonger[40993]: hyBOknqAcwZhtTgU70EDD6kmwdJcz2anhtbNIorOUMq6KO6JfY8naBOxeaQ/dbwk Dec 3 08:03:21 np0005543225 certmonger[40993]: cTn8KKRXsaxsosu8ZlNgwi/V+45sYrlVWQAC53EphRC7nnbaGvi67hleVCJPaYcS Dec 3 08:03:21 np0005543225 certmonger[40993]: AU0OH1HxI15L00M0Ou7hoV66CwcFECWxBAjSn3BMHaP190DXyRVL5lEAJeqCVmOk Dec 3 08:03:21 np0005543225 certmonger[40993]: 54EUFeE5Ef9rUpd2NL3U1xaYEQMA4yJCY4srKzJr5cscVjsulbLjT7QzOBR3iwfe Dec 3 08:03:21 np0005543225 certmonger[40993]: MIzH677jfEFtnwIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:03:21 np0005543225 certmonger[40993]: ADAAMwAwADgAMAAzADIAMTCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Dec 3 08:03:21 np0005543225 certmonger[40993]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:03:21 np0005543225 certmonger[40993]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3 Dec 3 08:03:21 np0005543225 certmonger[40993]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0 Dec 3 08:03:21 np0005543225 certmonger[40993]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Dec 3 08:03:21 np0005543225 certmonger[40993]: GwdoYXByb3h5GyFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYD Dec 3 08:03:21 np0005543225 certmonger[40993]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Dec 3 08:03:21 np0005543225 certmonger[40993]: BBYEFAYqcJZQDjSo2r8oy01GFL84p3fSMA0GCSqGSIb3DQEBCwUAA4IBAQAa+V6F Dec 3 08:03:21 np0005543225 certmonger[40993]: 0IbOfNX+ExuD7qoCRPdXWjyD1RkvIYdGw4vSMYPLMqZz8ypqG9kJGLcn8BzYnpwK Dec 3 08:03:21 np0005543225 certmonger[40993]: d8e1Zp0SVSAGxQn/Nr9305hpCtn+Du6hyx51k3fQEvZOSlrhXpa8m+kL03ThDjnS Dec 3 08:03:21 np0005543225 certmonger[40993]: UydEDFOpK54oEq7EyyAi8SuwY/jKN2mqxe6YR7efFoO6sPF7rLBnxy25gjUHOeS+ Dec 3 08:03:21 np0005543225 certmonger[40993]: 5NqtRdENdWKeQgGs48znPdZFJfu5b27tLUtOLDjAu4e3avLVjK9PLi5S+CwN0hjh Dec 3 08:03:21 np0005543225 certmonger[40993]: 520VY+T1vO1f5bl/63q9o334/ctoUmOEjU4wWWkbm0FuvPw2BIU8ZsbHdi22J3wS Dec 3 08:03:21 np0005543225 certmonger[40993]: meKb9i1Ti1+IJNXw Dec 3 08:03:21 np0005543225 certmonger[40993]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:21 np0005543225 certmonger[40993]: " for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt1+D33nxNwhfvr6hAaJ5IbivCiUnrKD4gMvweqXV/ojeYu6Oi+kBpJz9LFc0PJNhmVRPscSAhyBOknqAcwZhtTgU70EDD6kmwdJcz2anhtbNIorOUMq6KO6JfY8naBOxeaQ/dbwkcTn8KKRXsaxsosu8ZlNgwi/V+45sYrlVWQAC53EphRC7nnbaGvi67hleVCJPaYcSAU0OH1HxI15L00M0Ou7hoV66CwcFECWxBAjSn3BMHaP190DXyRVL5lEAJeqCVmOk54EUFeE5Ef9rUpd2NL3U1xaYEQMA4yJCY4srKzJr5cscVjsulbLjT7QzOBR3iwfeMIzH677jfEFtnwIDAQAB" for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:21 np0005543225 certmonger[40993]: 2025-12-03 08:03:21 [40993] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[40993]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:21 np0005543225 certmonger[40993]: Certificate: "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" Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Certificate submission still ongoing. Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Certificate submission attempt complete. Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Child status = 0. Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Child output: Dec 3 08:03:21 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:21 np0005543225 certmonger[38530]: MIIFezCCA+OgAwIBAgIBMTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:21 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:21 np0005543225 certmonger[38530]: MDMyMVoXDTI3MTIwNDA4MDMyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:21 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:21 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBALdfg9958TcIX76+oQGieSG4rwolJ6yg+IDL Dec 3 08:03:21 np0005543225 certmonger[38530]: 8Hql1f6I3mLujovpAaSc/SxXNDyTYZlUT7HEgIcgTpJ6gHMGYbU4FO9BAw+pJsHS Dec 3 08:03:21 np0005543225 certmonger[38530]: XM9mp4bWzSKKzlDKuijuiX2PJ2gTsXmkP3W8JHE5/CikV7GsbKLLvGZTYMIv1fuO Dec 3 08:03:21 np0005543225 certmonger[38530]: bGK5VVkAAudxKYUQu5522hr4uu4ZXlQiT2mHEgFNDh9R8SNeS9NDNDru4aFeugsH Dec 3 08:03:21 np0005543225 certmonger[38530]: BRAlsQQI0p9wTB2j9fdA18kVS+ZRACXqglZjpOeBFBXhORH/a1KXdjS91NcWmBED Dec 3 08:03:21 np0005543225 certmonger[38530]: AOMiQmOLKysya+XLHFY7LpWy40+0MzgUd4sH3jCMx+u+43xBbZ8CAwEAAaOCAgww Dec 3 08:03:21 np0005543225 certmonger[38530]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:21 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:21 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:21 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:21 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:21 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLlhNHcpkanJdanMuZ3D/ZF5 Dec 3 08:03:21 np0005543225 certmonger[38530]: U3B8MIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:21 np0005543225 certmonger[38530]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:21 np0005543225 certmonger[38530]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29vLnRlc3RA Dec 3 08:03:21 np0005543225 certmonger[38530]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:21 np0005543225 certmonger[38530]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Dec 3 08:03:21 np0005543225 certmonger[38530]: hkiG9w0BAQsFAAOCAYEAZSDZQ89ndjYIkcd+k1HLZbAEtONiO0UfAgiSD8b0z55p Dec 3 08:03:21 np0005543225 certmonger[38530]: k5gRE10kD1tmwuAGl68Vge431xS+2dl1KxrLbMUanOTKgRRxY0B7Xk+HexuHabF0 Dec 3 08:03:21 np0005543225 certmonger[38530]: AFOu9pdAm3uOG0ZQ5E4nRR5OOxdichzKda0I22aT9hA6yfGHHLzcY+FuQuMx+Q+v Dec 3 08:03:21 np0005543225 certmonger[38530]: 7zq8urs4p0PqkEgNT/OjMt6gqrMcXs0FkyY9oj/awoIAcOYhPF9EQCczaglrG4Tz Dec 3 08:03:21 np0005543225 certmonger[38530]: 3Bm9YC18qF8LuAz9Oh+eOn9oTymkDoX7uLf2PsJK5et8xZUfZkoQ6vw76HB2ZvzK Dec 3 08:03:21 np0005543225 certmonger[38530]: i/qAwD7dA7jxp11pC/dw0IG8/3YWm66f5i6Vk4HerkO6uxnnuc9XC8CQLfVZe7GJ Dec 3 08:03:21 np0005543225 certmonger[38530]: TWasAx8WkPuiU4ZMJJIIXQ27z49eeBiounuSpAB6J6j/481xgJjk2V+QdS6r3WfW Dec 3 08:03:21 np0005543225 certmonger[38530]: lNEbj3xQnS7h/e9cPD9vyWP6tOt5ZbYShskolt2C9J+a6TwXqOn7YSuDOCZxWkil Dec 3 08:03:21 np0005543225 certmonger[38530]: tUPdm2U/01VqwThwe+tT Dec 3 08:03:21 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:21 np0005543225 certmonger[38530]: " Dec 3 08:03:21 np0005543225 certmonger[40995]: 2025-12-03 08:03:21 [40995] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:21 np0005543225 certmonger[40995]: MIIFezCCA+OgAwIBAgIBMTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:21 np0005543225 certmonger[40995]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:21 np0005543225 certmonger[40995]: MDMyMVoXDTI3MTIwNDA4MDMyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:21 np0005543225 certmonger[40995]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:21 np0005543225 certmonger[40995]: hvcNAQEBBQADggEPADCCAQoCggEBALdfg9958TcIX76+oQGieSG4rwolJ6yg+IDL Dec 3 08:03:21 np0005543225 certmonger[40995]: 8Hql1f6I3mLujovpAaSc/SxXNDyTYZlUT7HEgIcgTpJ6gHMGYbU4FO9BAw+pJsHS Dec 3 08:03:21 np0005543225 certmonger[40995]: XM9mp4bWzSKKzlDKuijuiX2PJ2gTsXmkP3W8JHE5/CikV7GsbKLLvGZTYMIv1fuO Dec 3 08:03:21 np0005543225 certmonger[40995]: bGK5VVkAAudxKYUQu5522hr4uu4ZXlQiT2mHEgFNDh9R8SNeS9NDNDru4aFeugsH Dec 3 08:03:21 np0005543225 certmonger[40995]: BRAlsQQI0p9wTB2j9fdA18kVS+ZRACXqglZjpOeBFBXhORH/a1KXdjS91NcWmBED Dec 3 08:03:21 np0005543225 certmonger[40995]: AOMiQmOLKysya+XLHFY7LpWy40+0MzgUd4sH3jCMx+u+43xBbZ8CAwEAAaOCAgww Dec 3 08:03:21 np0005543225 certmonger[40995]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:21 np0005543225 certmonger[40995]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:21 np0005543225 certmonger[40995]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:21 np0005543225 certmonger[40995]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:21 np0005543225 certmonger[40995]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:21 np0005543225 certmonger[40995]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLlhNHcpkanJdanMuZ3D/ZF5 Dec 3 08:03:21 np0005543225 certmonger[40995]: U3B8MIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:21 np0005543225 certmonger[40995]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:21 np0005543225 certmonger[40995]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29vLnRlc3RA Dec 3 08:03:21 np0005543225 certmonger[40995]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:21 np0005543225 certmonger[40995]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Dec 3 08:03:21 np0005543225 certmonger[40995]: hkiG9w0BAQsFAAOCAYEAZSDZQ89ndjYIkcd+k1HLZbAEtONiO0UfAgiSD8b0z55p Dec 3 08:03:21 np0005543225 certmonger[40995]: k5gRE10kD1tmwuAGl68Vge431xS+2dl1KxrLbMUanOTKgRRxY0B7Xk+HexuHabF0 Dec 3 08:03:21 np0005543225 certmonger[40995]: AFOu9pdAm3uOG0ZQ5E4nRR5OOxdichzKda0I22aT9hA6yfGHHLzcY+FuQuMx+Q+v Dec 3 08:03:21 np0005543225 certmonger[40995]: 7zq8urs4p0PqkEgNT/OjMt6gqrMcXs0FkyY9oj/awoIAcOYhPF9EQCczaglrG4Tz Dec 3 08:03:21 np0005543225 certmonger[40995]: 3Bm9YC18qF8LuAz9Oh+eOn9oTymkDoX7uLf2PsJK5et8xZUfZkoQ6vw76HB2ZvzK Dec 3 08:03:21 np0005543225 certmonger[40995]: i/qAwD7dA7jxp11pC/dw0IG8/3YWm66f5i6Vk4HerkO6uxnnuc9XC8CQLfVZe7GJ Dec 3 08:03:21 np0005543225 certmonger[40995]: TWasAx8WkPuiU4ZMJJIIXQ27z49eeBiounuSpAB6J6j/481xgJjk2V+QdS6r3WfW Dec 3 08:03:21 np0005543225 certmonger[40995]: lNEbj3xQnS7h/e9cPD9vyWP6tOt5ZbYShskolt2C9J+a6TwXqOn7YSuDOCZxWkil Dec 3 08:03:21 np0005543225 certmonger[40995]: tUPdm2U/01VqwThwe+tT Dec 3 08:03:21 np0005543225 certmonger[40995]: -----END CERTIFICATE----- Dec 3 08:03:21 np0005543225 certmonger[40995]: ". Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Certificate submission still ongoing. Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Certificate submission postprocessing complete. Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Child status = 0. Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Child output: Dec 3 08:03:21 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFezCCA+OgAwIBAgIBMTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4\nMDMyMVoXDTI3MTIwNDA4MDMyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBALdfg9958TcIX76+oQGieSG4rwolJ6yg+IDL\n8Hql1f6I3mLujovpAaSc/SxXNDyTYZlUT7HEgIcgTpJ6gHMGYbU4FO9BAw+pJsHS\nXM9mp4bWzSKKzlDKuijuiX2PJ2gTsXmkP3W8JHE5/CikV7GsbKLLvGZTYMIv1fuO\nbGK5VVkAAudxKYUQu5522hr4uu4ZXlQiT2mHEgFNDh9R8SNeS9NDNDru4aFeugsH\nBRAlsQQI0p9wTB2j9fdA18kVS+ZRACXqglZjpOeBFBXhORH/a1KXdjS91NcWmBED\nAOMiQmOLKysya+XLHFY7LpWy40+0MzgUd4sH3jCMx+u+43xBbZ8CAwEAAaOCAgww\nggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLlhNHcpkanJdanMuZ3D/ZF5\nU3B8MIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u\ndGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU\nAgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29vLnRlc3RA\nT09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb\nB2hhcHJveHkbIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq\nhkiG9w0BAQsFAAOCAYEAZSDZQ89ndjYIkcd+k1HLZbAEtONiO0UfAgiSD8b0z55p\nk5gRE10kD1tmwuAGl68Vge431xS+2dl1KxrLbMUanOTKgRRxY0B7Xk+HexuHabF0\nAFOu9pdAm3uOG0ZQ5E4nRR5OOxdichzKda0I22aT9hA6yfGHHLzcY+FuQuMx+Q+v\n7zq8urs4p0PqkEgNT/OjMt6gqrMcXs0FkyY9oj/awoIAcOYhPF9EQCczaglrG4Tz\n3Bm9YC18qF8LuAz9Oh+eOn9oTymkDoX7uLf2PsJK5et8xZUfZkoQ6vw76HB2ZvzK\ni/qAwD7dA7jxp11pC/dw0IG8/3YWm66f5i6Vk4HerkO6uxnnuc9XC8CQLfVZe7GJ\nTWasAx8WkPuiU4ZMJJIIXQ27z49eeBiounuSpAB6J6j/481xgJjk2V+QdS6r3WfW\nlNEbj3xQnS7h/e9cPD9vyWP6tOt5ZbYShskolt2C9J+a6TwXqOn7YSuDOCZxWkil\ntUPdm2U/01VqwThwe+tT\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:21 np0005543225 certmonger[38530]: " Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:21 np0005543225 certmonger[38530]: MIIFezCCA+OgAwIBAgIBMTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:21 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:21 np0005543225 certmonger[38530]: MDMyMVoXDTI3MTIwNDA4MDMyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:21 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:21 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBALdfg9958TcIX76+oQGieSG4rwolJ6yg+IDL Dec 3 08:03:21 np0005543225 certmonger[38530]: 8Hql1f6I3mLujovpAaSc/SxXNDyTYZlUT7HEgIcgTpJ6gHMGYbU4FO9BAw+pJsHS Dec 3 08:03:21 np0005543225 certmonger[38530]: XM9mp4bWzSKKzlDKuijuiX2PJ2gTsXmkP3W8JHE5/CikV7GsbKLLvGZTYMIv1fuO Dec 3 08:03:21 np0005543225 certmonger[38530]: bGK5VVkAAudxKYUQu5522hr4uu4ZXlQiT2mHEgFNDh9R8SNeS9NDNDru4aFeugsH Dec 3 08:03:21 np0005543225 certmonger[38530]: BRAlsQQI0p9wTB2j9fdA18kVS+ZRACXqglZjpOeBFBXhORH/a1KXdjS91NcWmBED Dec 3 08:03:21 np0005543225 certmonger[38530]: AOMiQmOLKysya+XLHFY7LpWy40+0MzgUd4sH3jCMx+u+43xBbZ8CAwEAAaOCAgww Dec 3 08:03:21 np0005543225 certmonger[38530]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:21 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:21 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:21 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:21 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:21 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLlhNHcpkanJdanMuZ3D/ZF5 Dec 3 08:03:21 np0005543225 certmonger[38530]: U3B8MIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:21 np0005543225 certmonger[38530]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:21 np0005543225 certmonger[38530]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29vLnRlc3RA Dec 3 08:03:21 np0005543225 certmonger[38530]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:21 np0005543225 certmonger[38530]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Dec 3 08:03:21 np0005543225 certmonger[38530]: hkiG9w0BAQsFAAOCAYEAZSDZQ89ndjYIkcd+k1HLZbAEtONiO0UfAgiSD8b0z55p Dec 3 08:03:21 np0005543225 certmonger[38530]: k5gRE10kD1tmwuAGl68Vge431xS+2dl1KxrLbMUanOTKgRRxY0B7Xk+HexuHabF0 Dec 3 08:03:21 np0005543225 certmonger[38530]: AFOu9pdAm3uOG0ZQ5E4nRR5OOxdichzKda0I22aT9hA6yfGHHLzcY+FuQuMx+Q+v Dec 3 08:03:21 np0005543225 certmonger[38530]: 7zq8urs4p0PqkEgNT/OjMt6gqrMcXs0FkyY9oj/awoIAcOYhPF9EQCczaglrG4Tz Dec 3 08:03:21 np0005543225 certmonger[38530]: 3Bm9YC18qF8LuAz9Oh+eOn9oTymkDoX7uLf2PsJK5et8xZUfZkoQ6vw76HB2ZvzK Dec 3 08:03:21 np0005543225 certmonger[38530]: i/qAwD7dA7jxp11pC/dw0IG8/3YWm66f5i6Vk4HerkO6uxnnuc9XC8CQLfVZe7GJ Dec 3 08:03:21 np0005543225 certmonger[38530]: TWasAx8WkPuiU4ZMJJIIXQ27z49eeBiounuSpAB6J6j/481xgJjk2V+QdS6r3WfW Dec 3 08:03:21 np0005543225 certmonger[38530]: lNEbj3xQnS7h/e9cPD9vyWP6tOt5ZbYShskolt2C9J+a6TwXqOn7YSuDOCZxWkil Dec 3 08:03:21 np0005543225 certmonger[38530]: tUPdm2U/01VqwThwe+tT Dec 3 08:03:21 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:21 np0005543225 certmonger[38530]: ". Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] No hooks set for pre-save command. Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:21 np0005543225 certmonger[38530]: 2025-12-03 08:03:21 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:22 np0005543225 certmonger[38530]: 2025-12-03 08:03:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:22 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:22 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:22 np0005543225 certmonger[38530]: 2025-12-03 08:03:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:22 np0005543225 certmonger[38530]: 2025-12-03 08:03:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:22 np0005543225 certmonger[41063]: Certificate in file "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" issued by CA and saved. Dec 3 08:03:22 np0005543225 certmonger[38530]: 2025-12-03 08:03:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080321 Dec 3 08:03:22 np0005543225 python3[41079]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q lvm2 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:03:23 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:23 np0005543225 python3[41096]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:03:31 np0005543225 podman[41097]: 2025-12-03 08:03:23.933945199 +0000 UTC m=+0.045138951 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Dec 3 08:03:31 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:32 np0005543225 python3[41175]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 cluster.common.tag/manila-share:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:03:32 np0005543225 podman[41176]: 2025-12-03 08:03:32.213754318 +0000 UTC m=+0.036023719 image tag b9682dee21d7c5836da0f5094cc87a67e8c855fb08692e50824e31ad6f3d7b7f cluster.common.tag/manila-share:pcmklatest Dec 3 08:03:32 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:32 np0005543225 python3[41203]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:03:33 np0005543225 python3[41223]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:36 np0005543225 python3[41240]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:39 np0005543225 python3[41257]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:40 np0005543225 python3[41273]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:40 np0005543225 python3[41289]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:03:41 np0005543225 python3[41307]: ansible-certificate_request Invoked with name=memcached dns=['np0005543225.internalapi.ooo.test'] principal=['memcached/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep memcached)#012service_crt="/etc/pki/tls/certs/memcached.crt"#012service_key="/etc/pki/tls/private/memcached.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec -u root "$container_name" chown memcached:memcached "$service_crt"#012podman exec -u root "$container_name" chown memcached:memcached "$service_key"#012# Send refresh_certs command to memcached to read the new certificate#012memcached_ip="$(hiera -c /etc/puppet/hiera.yaml memcached::listen_ip.0 127.0.0.1)"#012memcached_port="$(hiera -c /etc/puppet/hiera.yaml memcached::tcp_port 11211)"#012echo refresh_certs | openssl s_client -connect $memcached_ip:$memcached_port#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:03:41 np0005543225 certmonger[41317]: " for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_REQ_PRINCIPAL" to "memcached/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:03:41 np0005543225 certmonger[41317]: " for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:41 np0005543225 certmonger[41317]: MIID3DCCAsQCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:03:41 np0005543225 certmonger[41317]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnsSDUvTV Dec 3 08:03:41 np0005543225 certmonger[41317]: ybITce+LjrTvH2ENjIXQ+oVN79FzoT4CXVKAksnKi3cDfTKJSKQVrRWEfsuGfbin Dec 3 08:03:41 np0005543225 certmonger[41317]: RXO/DWnVtFkW2HKGL0x/tRUSjQuleeOZ4ABBO46Uz2Is+gp5KS5MPSr8wETSzj2o Dec 3 08:03:41 np0005543225 certmonger[41317]: boIGVxWImony/nUY0ZSgc6Fn5sDLgxxFSQk5GAJs0h+7A9u2kIKhX3pS56S05Bzb Dec 3 08:03:41 np0005543225 certmonger[41317]: 5UTJbXJJfOpwQELlW7PBxUEd4KauGKiOduOkB5GXLaqCc/CUcQzqYfWvvybDrh+K Dec 3 08:03:41 np0005543225 certmonger[41317]: FlTyZPknwER4fG7pihNK3VZq7ld/Vq59vD3q/pcdbKjU3jUYZqh5NBXXrlla5uwb Dec 3 08:03:41 np0005543225 certmonger[41317]: 3MF5SUgGGbOQUQIDAQABoIIBaTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:03:41 np0005543225 certmonger[41317]: ADAAMwAwADgAMAAzADQAMTCCATgGCSqGSIb3DQEJDjGCASkwggElMAsGA1UdDwQE Dec 3 08:03:41 np0005543225 certmonger[41317]: AwIFoDCByQYDVR0RBIHBMIG+giFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:03:41 np0005543225 certmonger[41317]: LnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQvbnAwMDA1NTQzMjI1Lmlu Dec 3 08:03:41 np0005543225 certmonger[41317]: dGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisGAQUCAqBJMEegChsIT09P Dec 3 08:03:41 np0005543225 certmonger[41317]: LlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5wMDAwNTU0MzIyNS5pbnRl Dec 3 08:03:41 np0005543225 certmonger[41317]: cm5hbGFwaS5vb28udGVzdDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:41 np0005543225 certmonger[41317]: DAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUo8K/3inxYD/3zQ2fioX+6TL52ScwDQYJ Dec 3 08:03:41 np0005543225 certmonger[41317]: KoZIhvcNAQELBQADggEBAIvTBwetUulnQiLObXy7L0oTbfDWJsT89YQ+2rV2nAKZ Dec 3 08:03:41 np0005543225 certmonger[41317]: m1fAGVV9vORdv3wK4Lq2rvSUua0xFSNkTZdhI/zVlIyPh5lYicFqWHhdZkWKo6WN Dec 3 08:03:41 np0005543225 certmonger[41317]: rkNR0pmPdAbUuQxmkqKYFR5TAnd/JEtTn7VUdy8mHPQLHdAiJICCyylo+c8Qv5XE Dec 3 08:03:41 np0005543225 certmonger[41317]: ub9jw+d2XKKmKNUvvl+hXW+eqJbl977dEA6XOBlw7WS6lUKGAXHqwi7JHshPkTxw Dec 3 08:03:41 np0005543225 certmonger[41317]: +5oT9cNEDzBBuFLeTGowWWHv3TDrQgHeQZuhHWkiau6esGqbcUZ7rtH3hdDJcRAp Dec 3 08:03:41 np0005543225 certmonger[41317]: R+V3VJlh+l0BXNM2ZcgoQz/3L4Mt98YUtWKUH51kRGU= Dec 3 08:03:41 np0005543225 certmonger[41317]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:41 np0005543225 certmonger[41317]: " for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCexINS9NXJshNx74uOtO8fYQ2MhdD6hU3v0XOhPgJdUoCSycqLdwN9MolIpBWtFYR+y4Z9uKdFc78NadW0WRbYcoYvTH+1FRKNC6V545ngAEE7jpTPYiz6CnkpLkw9KvzARNLOPahuggZXFYiaifL+dRjRlKBzoWfmwMuDHEVJCTkYAmzSH7sD27aQgqFfelLnpLTkHNvlRMltckl86nBAQuVbs8HFQR3gpq4YqI5246QHkZctqoJz8JRxDOph9a+/JsOuH4oWVPJk+SfARHh8bumKE0rdVmruV39Wrn28Per+lx1sqNTeNRhmqHk0FdeuWVrm7BvcwXlJSAYZs5BRAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEALSJEocWpxaRLu+QJ0uZTlUsoF0CkfX//Vfau/ttoZsXUVdZxffan0tk4mb/S7/BgBtqAZRZByzI1Dyl1gtxUO4faoauwJBQsN7fwCcZ3utIZGnfoLeScx1ZggsD+zv0TIbi8IrSS0xynILfX6znFE+J8bEvf560zW+k90PJWVCxr9eSvLuH1Qh3AKGHfr5pF13NSvgX7vlvl8DB6///TyD9flPqSk0xuAhKjJ57aYF2VmveCtptjcTwyKX2nypKHvd6QFajW97fN/IeKQ0U4s+tWEnmL8wjJFnQqDskMOeGouFWhCDOIDjgFgJ+QHINQgb3uQVjqMHb3AeDeRGl3cg==" for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnsSDUvTVybITce+LjrTvH2ENjIXQ+oVN79FzoT4CXVKAksnKi3cDfTKJSKQVrRWEfsuGfbinRXO/DWnVtFkW2HKGL0x/tRUSjQuleeOZ4ABBO46Uz2Is+gp5KS5MPSr8wETSzj2oboIGVxWImony/nUY0ZSgc6Fn5sDLgxxFSQk5GAJs0h+7A9u2kIKhX3pS56S05Bzb5UTJbXJJfOpwQELlW7PBxUEd4KauGKiOduOkB5GXLaqCc/CUcQzqYfWvvybDrh+KFlTyZPknwER4fG7pihNK3VZq7ld/Vq59vD3q/pcdbKjU3jUYZqh5NBXXrlla5uwb3MF5SUgGGbOQUQIDAQAB" for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:41 np0005543225 certmonger[41317]: 2025-12-03 08:03:41 [41317] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:41 np0005543225 certmonger[38530]: 2025-12-03 08:03:41 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:41 np0005543225 certmonger[41317]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:42 np0005543225 certmonger[41317]: Certificate: "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" Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Certificate submission still ongoing. Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Certificate submission attempt complete. Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Child status = 0. Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Child output: Dec 3 08:03:42 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:42 np0005543225 certmonger[38530]: MIIFXzCCA8egAwIBAgIBMzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:42 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:42 np0005543225 certmonger[38530]: MDM0MloXDTI3MTIwNDA4MDM0MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:42 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:42 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAJ7Eg1L01cmyE3Hvi4607x9hDYyF0PqFTe/R Dec 3 08:03:42 np0005543225 certmonger[38530]: c6E+Al1SgJLJyot3A30yiUikFa0VhH7Lhn24p0Vzvw1p1bRZFthyhi9Mf7UVEo0L Dec 3 08:03:42 np0005543225 certmonger[38530]: pXnjmeAAQTuOlM9iLPoKeSkuTD0q/MBE0s49qG6CBlcViJqJ8v51GNGUoHOhZ+bA Dec 3 08:03:42 np0005543225 certmonger[38530]: y4McRUkJORgCbNIfuwPbtpCCoV96UuektOQc2+VEyW1ySXzqcEBC5VuzwcVBHeCm Dec 3 08:03:42 np0005543225 certmonger[38530]: rhiojnbjpAeRly2qgnPwlHEM6mH1r78mw64fihZU8mT5J8BEeHxu6YoTSt1Wau5X Dec 3 08:03:42 np0005543225 certmonger[38530]: f1aufbw96v6XHWyo1N41GGaoeTQV165ZWubsG9zBeUlIBhmzkFECAwEAAaOCAfAw Dec 3 08:03:42 np0005543225 certmonger[38530]: ggHsMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:42 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:42 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:42 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:42 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:42 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGYE9gavuJgMTAuTrrRqiEEd Dec 3 08:03:42 np0005543225 certmonger[38530]: U152MIHJBgNVHREEgcEwgb6CIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:42 np0005543225 certmonger[38530]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU1NDMyMjUuaW50 Dec 3 08:03:42 np0005543225 certmonger[38530]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Dec 3 08:03:42 np0005543225 certmonger[38530]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NTQzMjI1LmludGVy Dec 3 08:03:42 np0005543225 certmonger[38530]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBSC8bLJhqHsRiN3lnQ Dec 3 08:03:42 np0005543225 certmonger[38530]: ymdfgrw99F/k23H7RMCHX1rB6P/Gi3tmeZeLpt5Iop7NG6PAzWU1BNxXzEWLhI6U Dec 3 08:03:42 np0005543225 certmonger[38530]: LrLneZxERiDhAnU8vl6eFomKedi5S3/D83kNFWdD7IvlBOlE1/bxkSdzkd98Q00h Dec 3 08:03:42 np0005543225 certmonger[38530]: mcI0R9HuOVThEnQtlpLqG8itKfhET6zP+H/oqFX8KXzCiDMIRL60v48Wzepk0HWN Dec 3 08:03:42 np0005543225 certmonger[38530]: ZuJmIWsmBpAkASLpxEbvBd0QiSBMNJ3S+9NMIsi9uWw1XFrKQZBgpVno/Wa+NvFm Dec 3 08:03:42 np0005543225 certmonger[38530]: 2UHw7K1YKqpMURWb0Aha092MYwHaQY6kAdYKmGFlkWsZrUXrHuHKvmJ053ROSwoZ Dec 3 08:03:42 np0005543225 certmonger[38530]: RUrT+8rQe4gf6rw4o4joi8lwQexWEKr9THZX6/aNC0oITUYmz6nFGnLJkGHx2e9n Dec 3 08:03:42 np0005543225 certmonger[38530]: fSJ+CM5lT0AlO6KBAAnxdwjTZFTewVwJb85QAO8/0z3sVXPYdyWZssep+gCYCoVh Dec 3 08:03:42 np0005543225 certmonger[38530]: yr4uv0B+Qf9ENBWjXKg+oDeutHHN232pkwW0qoyrIr72afc= Dec 3 08:03:42 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:42 np0005543225 certmonger[38530]: " Dec 3 08:03:42 np0005543225 certmonger[41319]: 2025-12-03 08:03:42 [41319] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:42 np0005543225 certmonger[41319]: MIIFXzCCA8egAwIBAgIBMzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:42 np0005543225 certmonger[41319]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:42 np0005543225 certmonger[41319]: MDM0MloXDTI3MTIwNDA4MDM0MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:42 np0005543225 certmonger[41319]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:42 np0005543225 certmonger[41319]: hvcNAQEBBQADggEPADCCAQoCggEBAJ7Eg1L01cmyE3Hvi4607x9hDYyF0PqFTe/R Dec 3 08:03:42 np0005543225 certmonger[41319]: c6E+Al1SgJLJyot3A30yiUikFa0VhH7Lhn24p0Vzvw1p1bRZFthyhi9Mf7UVEo0L Dec 3 08:03:42 np0005543225 certmonger[41319]: pXnjmeAAQTuOlM9iLPoKeSkuTD0q/MBE0s49qG6CBlcViJqJ8v51GNGUoHOhZ+bA Dec 3 08:03:42 np0005543225 certmonger[41319]: y4McRUkJORgCbNIfuwPbtpCCoV96UuektOQc2+VEyW1ySXzqcEBC5VuzwcVBHeCm Dec 3 08:03:42 np0005543225 certmonger[41319]: rhiojnbjpAeRly2qgnPwlHEM6mH1r78mw64fihZU8mT5J8BEeHxu6YoTSt1Wau5X Dec 3 08:03:42 np0005543225 certmonger[41319]: f1aufbw96v6XHWyo1N41GGaoeTQV165ZWubsG9zBeUlIBhmzkFECAwEAAaOCAfAw Dec 3 08:03:42 np0005543225 certmonger[41319]: ggHsMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:42 np0005543225 certmonger[41319]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:42 np0005543225 certmonger[41319]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:42 np0005543225 certmonger[41319]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:42 np0005543225 certmonger[41319]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:42 np0005543225 certmonger[41319]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGYE9gavuJgMTAuTrrRqiEEd Dec 3 08:03:42 np0005543225 certmonger[41319]: U152MIHJBgNVHREEgcEwgb6CIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:42 np0005543225 certmonger[41319]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU1NDMyMjUuaW50 Dec 3 08:03:42 np0005543225 certmonger[41319]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Dec 3 08:03:42 np0005543225 certmonger[41319]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NTQzMjI1LmludGVy Dec 3 08:03:42 np0005543225 certmonger[41319]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBSC8bLJhqHsRiN3lnQ Dec 3 08:03:42 np0005543225 certmonger[41319]: ymdfgrw99F/k23H7RMCHX1rB6P/Gi3tmeZeLpt5Iop7NG6PAzWU1BNxXzEWLhI6U Dec 3 08:03:42 np0005543225 certmonger[41319]: LrLneZxERiDhAnU8vl6eFomKedi5S3/D83kNFWdD7IvlBOlE1/bxkSdzkd98Q00h Dec 3 08:03:42 np0005543225 certmonger[41319]: mcI0R9HuOVThEnQtlpLqG8itKfhET6zP+H/oqFX8KXzCiDMIRL60v48Wzepk0HWN Dec 3 08:03:42 np0005543225 certmonger[41319]: ZuJmIWsmBpAkASLpxEbvBd0QiSBMNJ3S+9NMIsi9uWw1XFrKQZBgpVno/Wa+NvFm Dec 3 08:03:42 np0005543225 certmonger[41319]: 2UHw7K1YKqpMURWb0Aha092MYwHaQY6kAdYKmGFlkWsZrUXrHuHKvmJ053ROSwoZ Dec 3 08:03:42 np0005543225 certmonger[41319]: RUrT+8rQe4gf6rw4o4joi8lwQexWEKr9THZX6/aNC0oITUYmz6nFGnLJkGHx2e9n Dec 3 08:03:42 np0005543225 certmonger[41319]: fSJ+CM5lT0AlO6KBAAnxdwjTZFTewVwJb85QAO8/0z3sVXPYdyWZssep+gCYCoVh Dec 3 08:03:42 np0005543225 certmonger[41319]: yr4uv0B+Qf9ENBWjXKg+oDeutHHN232pkwW0qoyrIr72afc= Dec 3 08:03:42 np0005543225 certmonger[41319]: -----END CERTIFICATE----- Dec 3 08:03:42 np0005543225 certmonger[41319]: ". Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Certificate submission still ongoing. Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Certificate submission postprocessing complete. Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Child status = 0. Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Child output: Dec 3 08:03:42 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nyr4uv0B+Qf9ENBWjXKg+oDeutHHN232pkwW0qoyrIr72afc=\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:42 np0005543225 certmonger[38530]: " Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:42 np0005543225 certmonger[38530]: MIIFXzCCA8egAwIBAgIBMzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:42 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:42 np0005543225 certmonger[38530]: MDM0MloXDTI3MTIwNDA4MDM0MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:42 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:42 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAJ7Eg1L01cmyE3Hvi4607x9hDYyF0PqFTe/R Dec 3 08:03:42 np0005543225 certmonger[38530]: c6E+Al1SgJLJyot3A30yiUikFa0VhH7Lhn24p0Vzvw1p1bRZFthyhi9Mf7UVEo0L Dec 3 08:03:42 np0005543225 certmonger[38530]: pXnjmeAAQTuOlM9iLPoKeSkuTD0q/MBE0s49qG6CBlcViJqJ8v51GNGUoHOhZ+bA Dec 3 08:03:42 np0005543225 certmonger[38530]: y4McRUkJORgCbNIfuwPbtpCCoV96UuektOQc2+VEyW1ySXzqcEBC5VuzwcVBHeCm Dec 3 08:03:42 np0005543225 certmonger[38530]: rhiojnbjpAeRly2qgnPwlHEM6mH1r78mw64fihZU8mT5J8BEeHxu6YoTSt1Wau5X Dec 3 08:03:42 np0005543225 certmonger[38530]: f1aufbw96v6XHWyo1N41GGaoeTQV165ZWubsG9zBeUlIBhmzkFECAwEAAaOCAfAw Dec 3 08:03:42 np0005543225 certmonger[38530]: ggHsMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:42 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:42 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:42 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:42 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:42 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGYE9gavuJgMTAuTrrRqiEEd Dec 3 08:03:42 np0005543225 certmonger[38530]: U152MIHJBgNVHREEgcEwgb6CIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:42 np0005543225 certmonger[38530]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU1NDMyMjUuaW50 Dec 3 08:03:42 np0005543225 certmonger[38530]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Dec 3 08:03:42 np0005543225 certmonger[38530]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NTQzMjI1LmludGVy Dec 3 08:03:42 np0005543225 certmonger[38530]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBSC8bLJhqHsRiN3lnQ Dec 3 08:03:42 np0005543225 certmonger[38530]: ymdfgrw99F/k23H7RMCHX1rB6P/Gi3tmeZeLpt5Iop7NG6PAzWU1BNxXzEWLhI6U Dec 3 08:03:42 np0005543225 certmonger[38530]: LrLneZxERiDhAnU8vl6eFomKedi5S3/D83kNFWdD7IvlBOlE1/bxkSdzkd98Q00h Dec 3 08:03:42 np0005543225 certmonger[38530]: mcI0R9HuOVThEnQtlpLqG8itKfhET6zP+H/oqFX8KXzCiDMIRL60v48Wzepk0HWN Dec 3 08:03:42 np0005543225 certmonger[38530]: ZuJmIWsmBpAkASLpxEbvBd0QiSBMNJ3S+9NMIsi9uWw1XFrKQZBgpVno/Wa+NvFm Dec 3 08:03:42 np0005543225 certmonger[38530]: 2UHw7K1YKqpMURWb0Aha092MYwHaQY6kAdYKmGFlkWsZrUXrHuHKvmJ053ROSwoZ Dec 3 08:03:42 np0005543225 certmonger[38530]: RUrT+8rQe4gf6rw4o4joi8lwQexWEKr9THZX6/aNC0oITUYmz6nFGnLJkGHx2e9n Dec 3 08:03:42 np0005543225 certmonger[38530]: fSJ+CM5lT0AlO6KBAAnxdwjTZFTewVwJb85QAO8/0z3sVXPYdyWZssep+gCYCoVh Dec 3 08:03:42 np0005543225 certmonger[38530]: yr4uv0B+Qf9ENBWjXKg+oDeutHHN232pkwW0qoyrIr72afc= Dec 3 08:03:42 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:42 np0005543225 certmonger[38530]: ". Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] No hooks set for pre-save command. Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 certmonger[38530]: 2025-12-03 08:03:42 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:42 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:42 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:43 np0005543225 certmonger[38530]: 2025-12-03 08:03:43 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:43 np0005543225 certmonger[38530]: 2025-12-03 08:03:43 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:43 np0005543225 certmonger[41388]: Certificate in file "/etc/pki/tls/certs/memcached.crt" issued by CA and saved. Dec 3 08:03:43 np0005543225 certmonger[38530]: 2025-12-03 08:03:43 [38530] Wrote to /var/lib/certmonger/requests/20251203080341 Dec 3 08:03:43 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:44 np0005543225 python3[41404]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:03:44 np0005543225 python3[41424]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:47 np0005543225 python3[41441]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:50 np0005543225 python3[41458]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:51 np0005543225 python3[41474]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:51 np0005543225 python3[41490]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:03:52 np0005543225 python3[41508]: ansible-certificate_request Invoked with name=metrics_qdr dns=['np0005543225.internalapi.ooo.test'] principal=['metrics_qdr/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep metrics_qdr)#012service_crt="/etc/pki/tls/certs/metrics_qdr.crt"#012service_key="/etc/pki/tls/private/metrics_qdr.key#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_crt"#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_key"#012# Trigger a container restart to read the new certificate#012podman restart "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:03:52 np0005543225 certmonger[41518]: " for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_REQ_PRINCIPAL" to "metrics_qdr/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:03:52 np0005543225 certmonger[41518]: " for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:52 np0005543225 certmonger[41518]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:03:52 np0005543225 certmonger[41518]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwdi3ffbS Dec 3 08:03:52 np0005543225 certmonger[41518]: hUjL13rN9PuANHLOkb2YvqBUoXcVI0AFzHDBMD9yT6BBaTEeq28Z+MagjPHutV8J Dec 3 08:03:52 np0005543225 certmonger[41518]: xVBLvFqxWaLR257edcfH1ur7F0/442opC6YN7+6CLrhvRIwMUB3yqNYP9iv9dm3C Dec 3 08:03:52 np0005543225 certmonger[41518]: RRpoHXgNB1TIFy2g58np9bYoI4tcmhbCRcMhdplAuBg+Mocni4EH53fIeReRi+OL Dec 3 08:03:52 np0005543225 certmonger[41518]: Rcy8WFJm5+tLbpfhauqQJm+cBNj/32ikE3MBFC4AMhpxOxCdULURsBS7nbRWRVwx Dec 3 08:03:52 np0005543225 certmonger[41518]: EPrlrnTJiSkZnsDg2SmnBy5CKsAIc4o20pkwXIFKYyqrMvghHMbQARBMpMACc8Ji Dec 3 08:03:52 np0005543225 certmonger[41518]: PjXzuCQG/iX8OwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:03:52 np0005543225 certmonger[41518]: ADAAMwAwADgAMAAzADUAMjCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Dec 3 08:03:52 np0005543225 certmonger[41518]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:03:52 np0005543225 certmonger[41518]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fkci9ucDAwMDU1NDMyMjUu Dec 3 08:03:52 np0005543225 certmonger[41518]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Dec 3 08:03:52 np0005543225 certmonger[41518]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRyGyFucDAwMDU1NDMyMjUu Dec 3 08:03:52 np0005543225 certmonger[41518]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Dec 3 08:03:52 np0005543225 certmonger[41518]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFEUNlyNPoK+xYqh9OXWTZO9swyl9 Dec 3 08:03:52 np0005543225 certmonger[41518]: MA0GCSqGSIb3DQEBCwUAA4IBAQBpsGax4E7V0s99E7EGiDTgiP4qlZrmBGB9oOAQ Dec 3 08:03:52 np0005543225 certmonger[41518]: G5K55kA7xeX414qv8f8TfzvANYr98HZuEs2BckqKvXjTk47UdGyCDSBP4I2zc9eF Dec 3 08:03:52 np0005543225 certmonger[41518]: h0MmjI10UO2Od1wf1MN3tBtJNbhFTd954nQXhyMSJvkOdLe+CgNmQxmyL1VN6DxJ Dec 3 08:03:52 np0005543225 certmonger[41518]: KN757pYx6qOEkh+kc/dEJq+TLtooHSMotPyyL53iF9g+ROpHNjVuVrPh+0RO56Ip Dec 3 08:03:52 np0005543225 certmonger[41518]: 90OndhUA4Kv56em5dae1X4hQUu0vveDNrqVPABKyVcSVA2thpIsEItEDlGC+qJFl Dec 3 08:03:52 np0005543225 certmonger[41518]: 3T4oIpLE/qawpv+9FVvezXvlhaXAgbNsim+1NSvqoz8OjdDp Dec 3 08:03:52 np0005543225 certmonger[41518]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:52 np0005543225 certmonger[41518]: " for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwdi3ffbShUjL13rN9PuANHLOkb2YvqBUoXcVI0AFzHDBMD9yT6BBaTEeq28Z+MagjPHutV8JxVBLvFqxWaLR257edcfH1ur7F0/442opC6YN7+6CLrhvRIwMUB3yqNYP9iv9dm3CRRpoHXgNB1TIFy2g58np9bYoI4tcmhbCRcMhdplAuBg+Mocni4EH53fIeReRi+OLRcy8WFJm5+tLbpfhauqQJm+cBNj/32ikE3MBFC4AMhpxOxCdULURsBS7nbRWRVwxEPrlrnTJiSkZnsDg2SmnBy5CKsAIc4o20pkwXIFKYyqrMvghHMbQARBMpMACc8JiPjXzuCQG/iX8OwIDAQAB" for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:52 np0005543225 certmonger[41518]: 2025-12-03 08:03:52 [41518] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:52 np0005543225 certmonger[38530]: 2025-12-03 08:03:52 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:52 np0005543225 certmonger[41518]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:53 np0005543225 certmonger[41518]: Certificate: "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" Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Certificate submission still ongoing. Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Certificate submission attempt complete. Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Child status = 0. Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Child output: Dec 3 08:03:53 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:53 np0005543225 certmonger[38530]: MIIFYzCCA8ugAwIBAgIBNTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:53 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:53 np0005543225 certmonger[38530]: MDM1M1oXDTI3MTIwNDA4MDM1M1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:53 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:53 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAMHYt3320oVIy9d6zfT7gDRyzpG9mL6gVKF3 Dec 3 08:03:53 np0005543225 certmonger[38530]: FSNABcxwwTA/ck+gQWkxHqtvGfjGoIzx7rVfCcVQS7xasVmi0due3nXHx9bq+xdP Dec 3 08:03:53 np0005543225 certmonger[38530]: +ONqKQumDe/ugi64b0SMDFAd8qjWD/Yr/XZtwkUaaB14DQdUyBctoOfJ6fW2KCOL Dec 3 08:03:53 np0005543225 certmonger[38530]: XJoWwkXDIXaZQLgYPjKHJ4uBB+d3yHkXkYvji0XMvFhSZufrS26X4WrqkCZvnATY Dec 3 08:03:53 np0005543225 certmonger[38530]: /99opBNzARQuADIacTsQnVC1EbAUu520VkVcMRD65a50yYkpGZ7A4NkppwcuQirA Dec 3 08:03:53 np0005543225 certmonger[38530]: CHOKNtKZMFyBSmMqqzL4IRzG0AEQTKTAAnPCYj4187gkBv4l/DsCAwEAAaOCAfQw Dec 3 08:03:53 np0005543225 certmonger[38530]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:53 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:53 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:53 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:53 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:53 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMcTfbh8IckmWNUHJ0kL9n4N Dec 3 08:03:53 np0005543225 certmonger[38530]: xu2bMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:53 np0005543225 certmonger[38530]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTU0MzIyNS5p Dec 3 08:03:53 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:03:53 np0005543225 certmonger[38530]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTU0MzIyNS5p Dec 3 08:03:53 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAJqR9SVE/OZQW Dec 3 08:03:53 np0005543225 certmonger[38530]: Ht6LoSEAFcN8VzmE5/SmggRi8C0YIFaV5C4TG2GRN9sPTEVX10HrQ3iOieOIdX7S Dec 3 08:03:53 np0005543225 certmonger[38530]: y0XNt4l5bOkvZZoRPCS4CB7gyZDyPeRLLtXGeNBI8It/8ukUQN1Ij3XL/xjfSHgH Dec 3 08:03:53 np0005543225 certmonger[38530]: PKFQvqZrbh9M1yeN3Z+Oxa7cjlaWYV82XRL53YI3W+c8si+4RzgG0dZ3UN8C8Aww Dec 3 08:03:53 np0005543225 certmonger[38530]: HsIX2z8Yar1XwkvjFdoHY/MirSj64ED91l/NETwX04uwUANDHcY7EInDC0wKPWUR Dec 3 08:03:53 np0005543225 certmonger[38530]: evVh/QDxIlOpUaUcGzsZhzn7QL7mL9eVib1tMubwa3E6uX7jTVl7MbgVnsfcLJ5p Dec 3 08:03:53 np0005543225 certmonger[38530]: 6/oulOElE6r8hBzWOaR8YNyN1ijPC+EJ5YXLtHcEhqTRHZtxCd1pnsaPeDHO+/Sf Dec 3 08:03:53 np0005543225 certmonger[38530]: GpSdopZVrbzxe2YoqcEy1+en6r/F/7z+vJ9Qf0140UfJIybqo6lbEwiDKmINKIF8 Dec 3 08:03:53 np0005543225 certmonger[38530]: GjsJq/hmlXgVEOtocIO0WHV6rAZtBYv9Ueea0v/GwFyAqeXcAE4+ Dec 3 08:03:53 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:53 np0005543225 certmonger[38530]: " Dec 3 08:03:53 np0005543225 certmonger[41520]: 2025-12-03 08:03:53 [41520] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:53 np0005543225 certmonger[41520]: MIIFYzCCA8ugAwIBAgIBNTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:53 np0005543225 certmonger[41520]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:53 np0005543225 certmonger[41520]: MDM1M1oXDTI3MTIwNDA4MDM1M1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:53 np0005543225 certmonger[41520]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:53 np0005543225 certmonger[41520]: hvcNAQEBBQADggEPADCCAQoCggEBAMHYt3320oVIy9d6zfT7gDRyzpG9mL6gVKF3 Dec 3 08:03:53 np0005543225 certmonger[41520]: FSNABcxwwTA/ck+gQWkxHqtvGfjGoIzx7rVfCcVQS7xasVmi0due3nXHx9bq+xdP Dec 3 08:03:53 np0005543225 certmonger[41520]: +ONqKQumDe/ugi64b0SMDFAd8qjWD/Yr/XZtwkUaaB14DQdUyBctoOfJ6fW2KCOL Dec 3 08:03:53 np0005543225 certmonger[41520]: XJoWwkXDIXaZQLgYPjKHJ4uBB+d3yHkXkYvji0XMvFhSZufrS26X4WrqkCZvnATY Dec 3 08:03:53 np0005543225 certmonger[41520]: /99opBNzARQuADIacTsQnVC1EbAUu520VkVcMRD65a50yYkpGZ7A4NkppwcuQirA Dec 3 08:03:53 np0005543225 certmonger[41520]: CHOKNtKZMFyBSmMqqzL4IRzG0AEQTKTAAnPCYj4187gkBv4l/DsCAwEAAaOCAfQw Dec 3 08:03:53 np0005543225 certmonger[41520]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:53 np0005543225 certmonger[41520]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:53 np0005543225 certmonger[41520]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:53 np0005543225 certmonger[41520]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:53 np0005543225 certmonger[41520]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:53 np0005543225 certmonger[41520]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMcTfbh8IckmWNUHJ0kL9n4N Dec 3 08:03:53 np0005543225 certmonger[41520]: xu2bMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:53 np0005543225 certmonger[41520]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTU0MzIyNS5p Dec 3 08:03:53 np0005543225 certmonger[41520]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:03:53 np0005543225 certmonger[41520]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTU0MzIyNS5p Dec 3 08:03:53 np0005543225 certmonger[41520]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAJqR9SVE/OZQW Dec 3 08:03:53 np0005543225 certmonger[41520]: Ht6LoSEAFcN8VzmE5/SmggRi8C0YIFaV5C4TG2GRN9sPTEVX10HrQ3iOieOIdX7S Dec 3 08:03:53 np0005543225 certmonger[41520]: y0XNt4l5bOkvZZoRPCS4CB7gyZDyPeRLLtXGeNBI8It/8ukUQN1Ij3XL/xjfSHgH Dec 3 08:03:53 np0005543225 certmonger[41520]: PKFQvqZrbh9M1yeN3Z+Oxa7cjlaWYV82XRL53YI3W+c8si+4RzgG0dZ3UN8C8Aww Dec 3 08:03:53 np0005543225 certmonger[41520]: HsIX2z8Yar1XwkvjFdoHY/MirSj64ED91l/NETwX04uwUANDHcY7EInDC0wKPWUR Dec 3 08:03:53 np0005543225 certmonger[41520]: evVh/QDxIlOpUaUcGzsZhzn7QL7mL9eVib1tMubwa3E6uX7jTVl7MbgVnsfcLJ5p Dec 3 08:03:53 np0005543225 certmonger[41520]: 6/oulOElE6r8hBzWOaR8YNyN1ijPC+EJ5YXLtHcEhqTRHZtxCd1pnsaPeDHO+/Sf Dec 3 08:03:53 np0005543225 certmonger[41520]: GpSdopZVrbzxe2YoqcEy1+en6r/F/7z+vJ9Qf0140UfJIybqo6lbEwiDKmINKIF8 Dec 3 08:03:53 np0005543225 certmonger[41520]: GjsJq/hmlXgVEOtocIO0WHV6rAZtBYv9Ueea0v/GwFyAqeXcAE4+ Dec 3 08:03:53 np0005543225 certmonger[41520]: -----END CERTIFICATE----- Dec 3 08:03:53 np0005543225 certmonger[41520]: ". Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Certificate submission still ongoing. Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Certificate submission postprocessing complete. Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Child status = 0. Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Child output: Dec 3 08:03:53 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nGjsJq/hmlXgVEOtocIO0WHV6rAZtBYv9Ueea0v/GwFyAqeXcAE4+\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:53 np0005543225 certmonger[38530]: " Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:53 np0005543225 certmonger[38530]: MIIFYzCCA8ugAwIBAgIBNTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:53 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:53 np0005543225 certmonger[38530]: MDM1M1oXDTI3MTIwNDA4MDM1M1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:53 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:53 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAMHYt3320oVIy9d6zfT7gDRyzpG9mL6gVKF3 Dec 3 08:03:53 np0005543225 certmonger[38530]: FSNABcxwwTA/ck+gQWkxHqtvGfjGoIzx7rVfCcVQS7xasVmi0due3nXHx9bq+xdP Dec 3 08:03:53 np0005543225 certmonger[38530]: +ONqKQumDe/ugi64b0SMDFAd8qjWD/Yr/XZtwkUaaB14DQdUyBctoOfJ6fW2KCOL Dec 3 08:03:53 np0005543225 certmonger[38530]: XJoWwkXDIXaZQLgYPjKHJ4uBB+d3yHkXkYvji0XMvFhSZufrS26X4WrqkCZvnATY Dec 3 08:03:53 np0005543225 certmonger[38530]: /99opBNzARQuADIacTsQnVC1EbAUu520VkVcMRD65a50yYkpGZ7A4NkppwcuQirA Dec 3 08:03:53 np0005543225 certmonger[38530]: CHOKNtKZMFyBSmMqqzL4IRzG0AEQTKTAAnPCYj4187gkBv4l/DsCAwEAAaOCAfQw Dec 3 08:03:53 np0005543225 certmonger[38530]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:53 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:53 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:53 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:53 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:53 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMcTfbh8IckmWNUHJ0kL9n4N Dec 3 08:03:53 np0005543225 certmonger[38530]: xu2bMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:53 np0005543225 certmonger[38530]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTU0MzIyNS5p Dec 3 08:03:53 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:03:53 np0005543225 certmonger[38530]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTU0MzIyNS5p Dec 3 08:03:53 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAJqR9SVE/OZQW Dec 3 08:03:53 np0005543225 certmonger[38530]: Ht6LoSEAFcN8VzmE5/SmggRi8C0YIFaV5C4TG2GRN9sPTEVX10HrQ3iOieOIdX7S Dec 3 08:03:53 np0005543225 certmonger[38530]: y0XNt4l5bOkvZZoRPCS4CB7gyZDyPeRLLtXGeNBI8It/8ukUQN1Ij3XL/xjfSHgH Dec 3 08:03:53 np0005543225 certmonger[38530]: PKFQvqZrbh9M1yeN3Z+Oxa7cjlaWYV82XRL53YI3W+c8si+4RzgG0dZ3UN8C8Aww Dec 3 08:03:53 np0005543225 certmonger[38530]: HsIX2z8Yar1XwkvjFdoHY/MirSj64ED91l/NETwX04uwUANDHcY7EInDC0wKPWUR Dec 3 08:03:53 np0005543225 certmonger[38530]: evVh/QDxIlOpUaUcGzsZhzn7QL7mL9eVib1tMubwa3E6uX7jTVl7MbgVnsfcLJ5p Dec 3 08:03:53 np0005543225 certmonger[38530]: 6/oulOElE6r8hBzWOaR8YNyN1ijPC+EJ5YXLtHcEhqTRHZtxCd1pnsaPeDHO+/Sf Dec 3 08:03:53 np0005543225 certmonger[38530]: GpSdopZVrbzxe2YoqcEy1+en6r/F/7z+vJ9Qf0140UfJIybqo6lbEwiDKmINKIF8 Dec 3 08:03:53 np0005543225 certmonger[38530]: GjsJq/hmlXgVEOtocIO0WHV6rAZtBYv9Ueea0v/GwFyAqeXcAE4+ Dec 3 08:03:53 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:03:53 np0005543225 certmonger[38530]: ". Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] No hooks set for pre-save command. Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:53 np0005543225 certmonger[41539]: Certificate in file "/etc/pki/tls/certs/metrics_qdr.crt" issued by CA and saved. Dec 3 08:03:53 np0005543225 certmonger[38530]: 2025-12-03 08:03:53 [38530] Wrote to /var/lib/certmonger/requests/20251203080352 Dec 3 08:03:54 np0005543225 python3[41555]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:03:55 np0005543225 python3[41575]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:59 np0005543225 python3[41592]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:02 np0005543225 python3[41677]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:02 np0005543225 python3[41693]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:02 np0005543225 python3[41709]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:04 np0005543225 python3[41727]: ansible-certificate_request Invoked with name=mysql dns=['np0005543225.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['mysql/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:04:04 np0005543225 certmonger[41737]: overcloud.internalapi.ooo.test Dec 3 08:04:04 np0005543225 certmonger[41737]: " for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_REQ_PRINCIPAL" to "mysql/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:04:04 np0005543225 certmonger[41737]: " for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:04 np0005543225 certmonger[41737]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:04:04 np0005543225 certmonger[41737]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkikt8bZT Dec 3 08:04:04 np0005543225 certmonger[41737]: 6JHaqJRSYn+CXFTjA5eIO8c+r80ylSCPpuU5kt3csCVOjqemGLKe7wHqfZsHtwVW Dec 3 08:04:04 np0005543225 certmonger[41737]: UG3Vy3Ro/zzVUqIpHiVfdU89w6yLwNL2FyH74kvW17H0Kb2hR7LhW1zSDuB1AU5k Dec 3 08:04:04 np0005543225 certmonger[41737]: T8E0esWIDOp0Rv95Qvpp6LgBGKDzr78UNSUaaCMwqWvVvaYkATOv62MlxHays3ZZ Dec 3 08:04:04 np0005543225 certmonger[41737]: AXlGhzTLS1Gos6PvcasjWBzvtI4m2zzwTI6e9MpNYa5SkuIYqt7xxIVKNYXZPrM4 Dec 3 08:04:04 np0005543225 certmonger[41737]: kNvZF6myVwETRF72JKDNluk7L33jxvF0sowa9hkH0XBvtiXHn8r3o9OnS+Yo3IfN Dec 3 08:04:04 np0005543225 certmonger[41737]: 6DS1n85MIkaErQIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:04 np0005543225 certmonger[41737]: ADAAMwAwADgAMAA0ADAANDCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Dec 3 08:04:04 np0005543225 certmonger[41737]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:04:04 np0005543225 certmonger[41737]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Dec 3 08:04:04 np0005543225 certmonger[41737]: FAIDoDIMMG15c3FsL25wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBP Dec 3 08:04:04 np0005543225 certmonger[41737]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Dec 3 08:04:04 np0005543225 certmonger[41737]: bXlzcWwbIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Dec 3 08:04:04 np0005543225 certmonger[41737]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Dec 3 08:04:04 np0005543225 certmonger[41737]: 2T/5hCK+lhxPFC+8zxDHw1LMVckwDQYJKoZIhvcNAQELBQADggEBAEMKJvBO7pkm Dec 3 08:04:04 np0005543225 certmonger[41737]: Egh4l66awi4XT8faGRSgVGJN5P5qQOgIDoD3IuhgSaaPS8nkmkkNz8vIPezZWujk Dec 3 08:04:04 np0005543225 certmonger[41737]: 4HHmEUVDjcc5RfaV3uILVVY9rgu89T//vvX+sEUqrcRwId/UXzzPGokHoYR3vmNm Dec 3 08:04:04 np0005543225 certmonger[41737]: dWaVVwZCqT6F7E4dhByxUv8yHfT+ba6btmWL7f1v/Vot9tVcCg7fV2RLy72gGmtt Dec 3 08:04:04 np0005543225 certmonger[41737]: 0BJs4lW+5QvL9VbF9I+fjhoc/QjuXcThTbuwpi8gydwcsMBa7FJzlo/BhcVi85Re Dec 3 08:04:04 np0005543225 certmonger[41737]: 7vq2N8/H0pqHJTfU1NRcyhmnzjfS6hdtxxd3FgKzJ3hjHJ9slRJ/fOkpwR/aVa/6 Dec 3 08:04:04 np0005543225 certmonger[41737]: 8eEmj0iKcYI= Dec 3 08:04:04 np0005543225 certmonger[41737]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:04 np0005543225 certmonger[41737]: " for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkikt8bZT6JHaqJRSYn+CXFTjA5eIO8c+r80ylSCPpuU5kt3csCVOjqemGLKe7wHqfZsHtwVWUG3Vy3Ro/zzVUqIpHiVfdU89w6yLwNL2FyH74kvW17H0Kb2hR7LhW1zSDuB1AU5kT8E0esWIDOp0Rv95Qvpp6LgBGKDzr78UNSUaaCMwqWvVvaYkATOv62MlxHays3ZZAXlGhzTLS1Gos6PvcasjWBzvtI4m2zzwTI6e9MpNYa5SkuIYqt7xxIVKNYXZPrM4kNvZF6myVwETRF72JKDNluk7L33jxvF0sowa9hkH0XBvtiXHn8r3o9OnS+Yo3IfN6DS1n85MIkaErQIDAQAB" for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:04 np0005543225 certmonger[41737]: 2025-12-03 08:04:04 [41737] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:04 np0005543225 certmonger[38530]: 2025-12-03 08:04:04 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:04 np0005543225 certmonger[41737]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:04:05 np0005543225 certmonger[41737]: Certificate: "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" Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Certificate submission still ongoing. Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Certificate submission attempt complete. Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Child status = 0. Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Child output: Dec 3 08:04:05 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:04:05 np0005543225 certmonger[38530]: MIIFdzCCA9+gAwIBAgIBNzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:05 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:05 np0005543225 certmonger[38530]: MDQwNVoXDTI3MTIwNDA4MDQwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:05 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:05 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAJIpLfG2U+iR2qiUUmJ/glxU4wOXiDvHPq/N Dec 3 08:04:05 np0005543225 certmonger[38530]: MpUgj6blOZLd3LAlTo6nphiynu8B6n2bB7cFVlBt1ct0aP881VKiKR4lX3VPPcOs Dec 3 08:04:05 np0005543225 certmonger[38530]: i8DS9hch++JL1tex9Cm9oUey4Vtc0g7gdQFOZE/BNHrFiAzqdEb/eUL6aei4ARig Dec 3 08:04:05 np0005543225 certmonger[38530]: 86+/FDUlGmgjMKlr1b2mJAEzr+tjJcR2srN2WQF5Roc0y0tRqLOj73GrI1gc77SO Dec 3 08:04:05 np0005543225 certmonger[38530]: Jts88EyOnvTKTWGuUpLiGKre8cSFSjWF2T6zOJDb2RepslcBE0Re9iSgzZbpOy99 Dec 3 08:04:05 np0005543225 certmonger[38530]: 48bxdLKMGvYZB9Fwb7Ylx5/K96PTp0vmKNyHzeg0tZ/OTCJGhK0CAwEAAaOCAggw Dec 3 08:04:05 np0005543225 certmonger[38530]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:05 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:05 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:05 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:05 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:05 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMV5OCKHWlAh79s0eqN5FbPz Dec 3 08:04:05 np0005543225 certmonger[38530]: eg1nMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:05 np0005543225 certmonger[38530]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:04:05 np0005543225 certmonger[38530]: AgOgMgwwbXlzcWwvbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:04:05 np0005543225 certmonger[38530]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Dec 3 08:04:05 np0005543225 certmonger[38530]: eXNxbBshbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:04:05 np0005543225 certmonger[38530]: DQEBCwUAA4IBgQAtaJh69iPbo9sI8+7vBgQQw6OPGpyYBlM+qt0eJwZmUC6tq4Q0 Dec 3 08:04:05 np0005543225 certmonger[38530]: Wz3zrNArXwjcC8raqmpHLSxB+oS2R83U+HD3ZILtPDlPE8nAHnVSsTFe8cc47Gkk Dec 3 08:04:05 np0005543225 certmonger[38530]: Mhk2thJrimijS3NbKjYJ5yRYNPWlu+jhlVNSvIh1JXyPc8Jrss0qOBJVGXPmOHTn Dec 3 08:04:05 np0005543225 certmonger[38530]: VUsvJPVUR+BtgLAb4qrrI2F5qgs8rYvqd4UKEKdOHDBxpc4fFVcUUDb9SVzRlokF Dec 3 08:04:05 np0005543225 certmonger[38530]: OAUBUpXK6fzvrhWWIAPkR9Z5HrKCOSZQOe9nVV165Ft57yJdz0FGigKUsE9Cd8mT Dec 3 08:04:05 np0005543225 certmonger[38530]: 27x7ZVzF0GryIsEP39Dwi1LqF59SqZ8/AnJ8UPIWXxIR8Hc1BAyI1fpXcdcbe1Z7 Dec 3 08:04:05 np0005543225 certmonger[38530]: 1sChAoezPMDo/7+l23fgiJb54q6uajGA527cD6U+ao3d2PolmBtg0N8oSCwZagYK Dec 3 08:04:05 np0005543225 certmonger[38530]: 4rEo7Qtw9TzfJ5ciO/Bb2WuZX05Nb7mWYgBwlpyMZAPWJ/KqGFEe27fB5DP9SxlH Dec 3 08:04:05 np0005543225 certmonger[38530]: nZ1sge8ujb4xZFg= Dec 3 08:04:05 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:04:05 np0005543225 certmonger[38530]: " Dec 3 08:04:05 np0005543225 certmonger[41739]: 2025-12-03 08:04:05 [41739] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:04:05 np0005543225 certmonger[41739]: MIIFdzCCA9+gAwIBAgIBNzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:05 np0005543225 certmonger[41739]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:05 np0005543225 certmonger[41739]: MDQwNVoXDTI3MTIwNDA4MDQwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:05 np0005543225 certmonger[41739]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:05 np0005543225 certmonger[41739]: hvcNAQEBBQADggEPADCCAQoCggEBAJIpLfG2U+iR2qiUUmJ/glxU4wOXiDvHPq/N Dec 3 08:04:05 np0005543225 certmonger[41739]: MpUgj6blOZLd3LAlTo6nphiynu8B6n2bB7cFVlBt1ct0aP881VKiKR4lX3VPPcOs Dec 3 08:04:05 np0005543225 certmonger[41739]: i8DS9hch++JL1tex9Cm9oUey4Vtc0g7gdQFOZE/BNHrFiAzqdEb/eUL6aei4ARig Dec 3 08:04:05 np0005543225 certmonger[41739]: 86+/FDUlGmgjMKlr1b2mJAEzr+tjJcR2srN2WQF5Roc0y0tRqLOj73GrI1gc77SO Dec 3 08:04:05 np0005543225 certmonger[41739]: Jts88EyOnvTKTWGuUpLiGKre8cSFSjWF2T6zOJDb2RepslcBE0Re9iSgzZbpOy99 Dec 3 08:04:05 np0005543225 certmonger[41739]: 48bxdLKMGvYZB9Fwb7Ylx5/K96PTp0vmKNyHzeg0tZ/OTCJGhK0CAwEAAaOCAggw Dec 3 08:04:05 np0005543225 certmonger[41739]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:05 np0005543225 certmonger[41739]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:05 np0005543225 certmonger[41739]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:05 np0005543225 certmonger[41739]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:05 np0005543225 certmonger[41739]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:05 np0005543225 certmonger[41739]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMV5OCKHWlAh79s0eqN5FbPz Dec 3 08:04:05 np0005543225 certmonger[41739]: eg1nMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:05 np0005543225 certmonger[41739]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:04:05 np0005543225 certmonger[41739]: AgOgMgwwbXlzcWwvbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:04:05 np0005543225 certmonger[41739]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Dec 3 08:04:05 np0005543225 certmonger[41739]: eXNxbBshbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:04:05 np0005543225 certmonger[41739]: DQEBCwUAA4IBgQAtaJh69iPbo9sI8+7vBgQQw6OPGpyYBlM+qt0eJwZmUC6tq4Q0 Dec 3 08:04:05 np0005543225 certmonger[41739]: Wz3zrNArXwjcC8raqmpHLSxB+oS2R83U+HD3ZILtPDlPE8nAHnVSsTFe8cc47Gkk Dec 3 08:04:05 np0005543225 certmonger[41739]: Mhk2thJrimijS3NbKjYJ5yRYNPWlu+jhlVNSvIh1JXyPc8Jrss0qOBJVGXPmOHTn Dec 3 08:04:05 np0005543225 certmonger[41739]: VUsvJPVUR+BtgLAb4qrrI2F5qgs8rYvqd4UKEKdOHDBxpc4fFVcUUDb9SVzRlokF Dec 3 08:04:05 np0005543225 certmonger[41739]: OAUBUpXK6fzvrhWWIAPkR9Z5HrKCOSZQOe9nVV165Ft57yJdz0FGigKUsE9Cd8mT Dec 3 08:04:05 np0005543225 certmonger[41739]: 27x7ZVzF0GryIsEP39Dwi1LqF59SqZ8/AnJ8UPIWXxIR8Hc1BAyI1fpXcdcbe1Z7 Dec 3 08:04:05 np0005543225 certmonger[41739]: 1sChAoezPMDo/7+l23fgiJb54q6uajGA527cD6U+ao3d2PolmBtg0N8oSCwZagYK Dec 3 08:04:05 np0005543225 certmonger[41739]: 4rEo7Qtw9TzfJ5ciO/Bb2WuZX05Nb7mWYgBwlpyMZAPWJ/KqGFEe27fB5DP9SxlH Dec 3 08:04:05 np0005543225 certmonger[41739]: nZ1sge8ujb4xZFg= Dec 3 08:04:05 np0005543225 certmonger[41739]: -----END CERTIFICATE----- Dec 3 08:04:05 np0005543225 certmonger[41739]: ". Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Certificate submission still ongoing. Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Certificate submission postprocessing complete. Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Child status = 0. Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Child output: Dec 3 08:04:05 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nnZ1sge8ujb4xZFg=\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:04:05 np0005543225 certmonger[38530]: " Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:04:05 np0005543225 certmonger[38530]: MIIFdzCCA9+gAwIBAgIBNzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:05 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:05 np0005543225 certmonger[38530]: MDQwNVoXDTI3MTIwNDA4MDQwNVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:05 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:05 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAJIpLfG2U+iR2qiUUmJ/glxU4wOXiDvHPq/N Dec 3 08:04:05 np0005543225 certmonger[38530]: MpUgj6blOZLd3LAlTo6nphiynu8B6n2bB7cFVlBt1ct0aP881VKiKR4lX3VPPcOs Dec 3 08:04:05 np0005543225 certmonger[38530]: i8DS9hch++JL1tex9Cm9oUey4Vtc0g7gdQFOZE/BNHrFiAzqdEb/eUL6aei4ARig Dec 3 08:04:05 np0005543225 certmonger[38530]: 86+/FDUlGmgjMKlr1b2mJAEzr+tjJcR2srN2WQF5Roc0y0tRqLOj73GrI1gc77SO Dec 3 08:04:05 np0005543225 certmonger[38530]: Jts88EyOnvTKTWGuUpLiGKre8cSFSjWF2T6zOJDb2RepslcBE0Re9iSgzZbpOy99 Dec 3 08:04:05 np0005543225 certmonger[38530]: 48bxdLKMGvYZB9Fwb7Ylx5/K96PTp0vmKNyHzeg0tZ/OTCJGhK0CAwEAAaOCAggw Dec 3 08:04:05 np0005543225 certmonger[38530]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:05 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:05 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:05 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:05 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:05 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMV5OCKHWlAh79s0eqN5FbPz Dec 3 08:04:05 np0005543225 certmonger[38530]: eg1nMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:05 np0005543225 certmonger[38530]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:04:05 np0005543225 certmonger[38530]: AgOgMgwwbXlzcWwvbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:04:05 np0005543225 certmonger[38530]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Dec 3 08:04:05 np0005543225 certmonger[38530]: eXNxbBshbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:04:05 np0005543225 certmonger[38530]: DQEBCwUAA4IBgQAtaJh69iPbo9sI8+7vBgQQw6OPGpyYBlM+qt0eJwZmUC6tq4Q0 Dec 3 08:04:05 np0005543225 certmonger[38530]: Wz3zrNArXwjcC8raqmpHLSxB+oS2R83U+HD3ZILtPDlPE8nAHnVSsTFe8cc47Gkk Dec 3 08:04:05 np0005543225 certmonger[38530]: Mhk2thJrimijS3NbKjYJ5yRYNPWlu+jhlVNSvIh1JXyPc8Jrss0qOBJVGXPmOHTn Dec 3 08:04:05 np0005543225 certmonger[38530]: VUsvJPVUR+BtgLAb4qrrI2F5qgs8rYvqd4UKEKdOHDBxpc4fFVcUUDb9SVzRlokF Dec 3 08:04:05 np0005543225 certmonger[38530]: OAUBUpXK6fzvrhWWIAPkR9Z5HrKCOSZQOe9nVV165Ft57yJdz0FGigKUsE9Cd8mT Dec 3 08:04:05 np0005543225 certmonger[38530]: 27x7ZVzF0GryIsEP39Dwi1LqF59SqZ8/AnJ8UPIWXxIR8Hc1BAyI1fpXcdcbe1Z7 Dec 3 08:04:05 np0005543225 certmonger[38530]: 1sChAoezPMDo/7+l23fgiJb54q6uajGA527cD6U+ao3d2PolmBtg0N8oSCwZagYK Dec 3 08:04:05 np0005543225 certmonger[38530]: 4rEo7Qtw9TzfJ5ciO/Bb2WuZX05Nb7mWYgBwlpyMZAPWJ/KqGFEe27fB5DP9SxlH Dec 3 08:04:05 np0005543225 certmonger[38530]: nZ1sge8ujb4xZFg= Dec 3 08:04:05 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:04:05 np0005543225 certmonger[38530]: ". Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] No hooks set for pre-save command. Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] No hooks set for post-save command. Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:05 np0005543225 certmonger[41743]: Certificate in file "/etc/pki/tls/certs/mysql.crt" issued by CA and saved. Dec 3 08:04:05 np0005543225 certmonger[38530]: 2025-12-03 08:04:05 [38530] Wrote to /var/lib/certmonger/requests/20251203080404 Dec 3 08:04:06 np0005543225 python3[41759]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:04:13 np0005543225 podman[41760]: 2025-12-03 08:04:06.315739937 +0000 UTC m=+0.047465779 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 08:04:13 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:13 np0005543225 python3[41826]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 cluster.common.tag/mariadb:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:04:13 np0005543225 podman[41827]: 2025-12-03 08:04:13.72243003 +0000 UTC m=+0.046568861 image tag b13c44df76d5b3bb87652b20507cc40d62568630b0249319c13c07bbb18c36c3 cluster.common.tag/mariadb:pcmklatest Dec 3 08:04:13 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:14 np0005543225 python3[41853]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:04:15 np0005543225 python3[41873]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:18 np0005543225 python3[41890]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:21 np0005543225 python3[41907]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:21 np0005543225 python3[41923]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:22 np0005543225 python3[41939]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:22 np0005543225 python3[41957]: ansible-certificate_request Invoked with name=neutron_ovn dns=['np0005543225.internalapi.ooo.test'] principal=['neutron_ovn/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Dec 3 08:04:22 np0005543225 certmonger[38530]: 2025-12-03 08:04:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:22 np0005543225 certmonger[38530]: 2025-12-03 08:04:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:22 np0005543225 certmonger[38530]: 2025-12-03 08:04:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:22 np0005543225 certmonger[38530]: 2025-12-03 08:04:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:22 np0005543225 certmonger[38530]: 2025-12-03 08:04:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:22 np0005543225 certmonger[38530]: 2025-12-03 08:04:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:22 np0005543225 certmonger[38530]: 2025-12-03 08:04:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:22 np0005543225 certmonger[38530]: 2025-12-03 08:04:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:22 np0005543225 certmonger[38530]: 2025-12-03 08:04:22 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[38530]: 2025-12-03 08:04:23 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[38530]: 2025-12-03 08:04:23 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[38530]: 2025-12-03 08:04:23 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[38530]: 2025-12-03 08:04:23 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[38530]: 2025-12-03 08:04:23 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[38530]: 2025-12-03 08:04:23 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[38530]: 2025-12-03 08:04:23 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[38530]: 2025-12-03 08:04:23 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:04:23 np0005543225 certmonger[41967]: " for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_REQ_PRINCIPAL" to "neutron_ovn/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:04:23 np0005543225 certmonger[41967]: " for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:23 np0005543225 certmonger[41967]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:04:23 np0005543225 certmonger[41967]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv388Df7z Dec 3 08:04:23 np0005543225 certmonger[41967]: RKcR2bxmD/2DLJP8qq6cpBG4Pdi1kULnBQNDwQtpTi2v/4bBc/awmz1r5RYQB87S Dec 3 08:04:23 np0005543225 certmonger[41967]: SVz68sn/wXtQLQW6sOPNNv0DyGoWVmo2vX1q/Ic78wzOIrmtpnxpZ9q7Eu2AkhC1 Dec 3 08:04:23 np0005543225 certmonger[41967]: xlv75rs0TfzGN8LKoq9NEtBsLw8i/vybMF54II/waeghwPq9TN7ZFVR/OFnW5QGn Dec 3 08:04:23 np0005543225 certmonger[41967]: PT9zcm3LHU5x1Bsyip+AQ3/yNtQOn00cnUkv8zFaK856UZX2mVJy6+/okMD3bPyH Dec 3 08:04:23 np0005543225 certmonger[41967]: Hqwsf3t60nXgBGPVA1DeB0IGx9A026yhwjPy5YiRHcLiAkwN3y80/qIPA10ypevm Dec 3 08:04:23 np0005543225 certmonger[41967]: LzjlhQEQUvsMdQIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:23 np0005543225 certmonger[41967]: ADAAMwAwADgAMAA0ADIAMjCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Dec 3 08:04:23 np0005543225 certmonger[41967]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:04:23 np0005543225 certmonger[41967]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292bi9ucDAwMDU1NDMyMjUu Dec 3 08:04:23 np0005543225 certmonger[41967]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Dec 3 08:04:23 np0005543225 certmonger[41967]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3ZuGyFucDAwMDU1NDMyMjUu Dec 3 08:04:23 np0005543225 certmonger[41967]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Dec 3 08:04:23 np0005543225 certmonger[41967]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFCo/Ym9R/ZgMX9j4ToTohmCgm0TE Dec 3 08:04:23 np0005543225 certmonger[41967]: MA0GCSqGSIb3DQEBCwUAA4IBAQAv+F5QuybuWvZHJiTup8RhbBuNkCuTdRy63aso Dec 3 08:04:23 np0005543225 certmonger[41967]: am2Fw05UKbQsEEAN7zVhl7PF4L/WPXZ9nf/2dye62YM15iNAFg7FDKv/x/wHnRRm Dec 3 08:04:23 np0005543225 certmonger[41967]: awEk5AASLWPNOHl+WPg7+GhmuW392roK03IMLyDi5aEw45ZjwtZmEzufx7JSwDlz Dec 3 08:04:23 np0005543225 certmonger[41967]: q7qUlr0OSdvSteexzYrxQKXhaIkgEsAz+wfbCa5FLnLr5a15W7EFBkZJ9fqS2JHa Dec 3 08:04:23 np0005543225 certmonger[41967]: 4DEptDmXEb6A38x2gAxDv9LeRXOsT1ylXZOnBXc/A3+0O3YjpVOxHRwdOZuqIQwL Dec 3 08:04:23 np0005543225 certmonger[41967]: SaBo0VOH6RpAodWMr5pYiNKVFeCLx1updnSQj2ELmVDLRBhF Dec 3 08:04:23 np0005543225 certmonger[41967]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:23 np0005543225 certmonger[41967]: " for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv388Df7zRKcR2bxmD/2DLJP8qq6cpBG4Pdi1kULnBQNDwQtpTi2v/4bBc/awmz1r5RYQB87SSVz68sn/wXtQLQW6sOPNNv0DyGoWVmo2vX1q/Ic78wzOIrmtpnxpZ9q7Eu2AkhC1xlv75rs0TfzGN8LKoq9NEtBsLw8i/vybMF54II/waeghwPq9TN7ZFVR/OFnW5QGnPT9zcm3LHU5x1Bsyip+AQ3/yNtQOn00cnUkv8zFaK856UZX2mVJy6+/okMD3bPyHHqwsf3t60nXgBGPVA1DeB0IGx9A026yhwjPy5YiRHcLiAkwN3y80/qIPA10ypevmLzjlhQEQUvsMdQIDAQAB" for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:23 np0005543225 certmonger[41967]: 2025-12-03 08:04:23 [41967] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:23 np0005543225 certmonger[38530]: 2025-12-03 08:04:23 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:23 np0005543225 certmonger[41967]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:04:24 np0005543225 certmonger[41967]: Certificate: "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" Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Certificate submission still ongoing. Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Certificate submission attempt complete. Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Child status = 0. Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Child output: Dec 3 08:04:24 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:04:24 np0005543225 certmonger[38530]: MIIFYzCCA8ugAwIBAgIBPDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:24 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:24 np0005543225 certmonger[38530]: MDQyM1oXDTI3MTIwNDA4MDQyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:24 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:24 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAL9/PA3+80SnEdm8Zg/9gyyT/KqunKQRuD3Y Dec 3 08:04:24 np0005543225 certmonger[38530]: tZFC5wUDQ8ELaU4tr/+GwXP2sJs9a+UWEAfO0klc+vLJ/8F7UC0FurDjzTb9A8hq Dec 3 08:04:24 np0005543225 certmonger[38530]: FlZqNr19avyHO/MMziK5raZ8aWfauxLtgJIQtcZb++a7NE38xjfCyqKvTRLQbC8P Dec 3 08:04:24 np0005543225 certmonger[38530]: Iv78mzBeeCCP8GnoIcD6vUze2RVUfzhZ1uUBpz0/c3Jtyx1OcdQbMoqfgEN/8jbU Dec 3 08:04:24 np0005543225 certmonger[38530]: Dp9NHJ1JL/MxWivOelGV9plScuvv6JDA92z8hx6sLH97etJ14ARj1QNQ3gdCBsfQ Dec 3 08:04:24 np0005543225 certmonger[38530]: NNusocIz8uWIkR3C4gJMDd8vNP6iDwNdMqXr5i845YUBEFL7DHUCAwEAAaOCAfQw Dec 3 08:04:24 np0005543225 certmonger[38530]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:24 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:24 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:24 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:24 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:24 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCpxQ18wUpqebV26MO9JpRNz Dec 3 08:04:24 np0005543225 certmonger[38530]: CdadMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:24 np0005543225 certmonger[38530]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTU0MzIyNS5p Dec 3 08:04:24 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:24 np0005543225 certmonger[38530]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTU0MzIyNS5p Dec 3 08:04:24 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAdzDu6yNHCmFX Dec 3 08:04:24 np0005543225 certmonger[38530]: XceYcMXsaeLoF/ZRfOE4WilfAWXLc4rt4sQdktR2r77O4Kd3nox/y+5DgemWUkL9 Dec 3 08:04:24 np0005543225 certmonger[38530]: Mtma52wTVnwG/bdeC5cAtHjpa4PBkvYK9qo2nEMD5TbnW1kBkGOXZG0SFOvngKjK Dec 3 08:04:24 np0005543225 certmonger[38530]: KNJQ1dRxsVeDXZ5+WnPPuRGEWR/hSXrqX3bspBFoUxtcomJAgegqcF1Wf2dcuaFE Dec 3 08:04:24 np0005543225 certmonger[38530]: Qt/6Z58kkl+D/2wGMANS6b7xWY/NlCsy6NnBDrNx3nQwyshIaAaYpgCKD2x4Jic4 Dec 3 08:04:24 np0005543225 certmonger[38530]: bwQFgpHVHuO74xVnR0phG6FAh57ECVgzvI6RMhnysJftPWH2gy4Z9X4eqKZeLgyf Dec 3 08:04:24 np0005543225 certmonger[38530]: 5pxumscZl2aDyjS6Kn+P1RojJbnyjdUsok1iHebrwCZb1wVM2SdvG/gsaRPjtXDk Dec 3 08:04:24 np0005543225 certmonger[38530]: 116w12m8gNEuaguaXpEcKrcbzMQbYTBHbUW3u30hM87bExsKZXkSIr1lZi5RmWVL Dec 3 08:04:24 np0005543225 certmonger[38530]: OQdNNEgYcwNgt0QVfYg14SuGAcVuispqvpfXQTX73U7Q8xs7tVXM Dec 3 08:04:24 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:04:24 np0005543225 certmonger[38530]: " Dec 3 08:04:24 np0005543225 certmonger[41969]: 2025-12-03 08:04:24 [41969] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:04:24 np0005543225 certmonger[41969]: MIIFYzCCA8ugAwIBAgIBPDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:24 np0005543225 certmonger[41969]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:24 np0005543225 certmonger[41969]: MDQyM1oXDTI3MTIwNDA4MDQyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:24 np0005543225 certmonger[41969]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:24 np0005543225 certmonger[41969]: hvcNAQEBBQADggEPADCCAQoCggEBAL9/PA3+80SnEdm8Zg/9gyyT/KqunKQRuD3Y Dec 3 08:04:24 np0005543225 certmonger[41969]: tZFC5wUDQ8ELaU4tr/+GwXP2sJs9a+UWEAfO0klc+vLJ/8F7UC0FurDjzTb9A8hq Dec 3 08:04:24 np0005543225 certmonger[41969]: FlZqNr19avyHO/MMziK5raZ8aWfauxLtgJIQtcZb++a7NE38xjfCyqKvTRLQbC8P Dec 3 08:04:24 np0005543225 certmonger[41969]: Iv78mzBeeCCP8GnoIcD6vUze2RVUfzhZ1uUBpz0/c3Jtyx1OcdQbMoqfgEN/8jbU Dec 3 08:04:24 np0005543225 certmonger[41969]: Dp9NHJ1JL/MxWivOelGV9plScuvv6JDA92z8hx6sLH97etJ14ARj1QNQ3gdCBsfQ Dec 3 08:04:24 np0005543225 certmonger[41969]: NNusocIz8uWIkR3C4gJMDd8vNP6iDwNdMqXr5i845YUBEFL7DHUCAwEAAaOCAfQw Dec 3 08:04:24 np0005543225 certmonger[41969]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:24 np0005543225 certmonger[41969]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:24 np0005543225 certmonger[41969]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:24 np0005543225 certmonger[41969]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:24 np0005543225 certmonger[41969]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:24 np0005543225 certmonger[41969]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCpxQ18wUpqebV26MO9JpRNz Dec 3 08:04:24 np0005543225 certmonger[41969]: CdadMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:24 np0005543225 certmonger[41969]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTU0MzIyNS5p Dec 3 08:04:24 np0005543225 certmonger[41969]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:24 np0005543225 certmonger[41969]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTU0MzIyNS5p Dec 3 08:04:24 np0005543225 certmonger[41969]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAdzDu6yNHCmFX Dec 3 08:04:24 np0005543225 certmonger[41969]: XceYcMXsaeLoF/ZRfOE4WilfAWXLc4rt4sQdktR2r77O4Kd3nox/y+5DgemWUkL9 Dec 3 08:04:24 np0005543225 certmonger[41969]: Mtma52wTVnwG/bdeC5cAtHjpa4PBkvYK9qo2nEMD5TbnW1kBkGOXZG0SFOvngKjK Dec 3 08:04:24 np0005543225 certmonger[41969]: KNJQ1dRxsVeDXZ5+WnPPuRGEWR/hSXrqX3bspBFoUxtcomJAgegqcF1Wf2dcuaFE Dec 3 08:04:24 np0005543225 certmonger[41969]: Qt/6Z58kkl+D/2wGMANS6b7xWY/NlCsy6NnBDrNx3nQwyshIaAaYpgCKD2x4Jic4 Dec 3 08:04:24 np0005543225 certmonger[41969]: bwQFgpHVHuO74xVnR0phG6FAh57ECVgzvI6RMhnysJftPWH2gy4Z9X4eqKZeLgyf Dec 3 08:04:24 np0005543225 certmonger[41969]: 5pxumscZl2aDyjS6Kn+P1RojJbnyjdUsok1iHebrwCZb1wVM2SdvG/gsaRPjtXDk Dec 3 08:04:24 np0005543225 certmonger[41969]: 116w12m8gNEuaguaXpEcKrcbzMQbYTBHbUW3u30hM87bExsKZXkSIr1lZi5RmWVL Dec 3 08:04:24 np0005543225 certmonger[41969]: OQdNNEgYcwNgt0QVfYg14SuGAcVuispqvpfXQTX73U7Q8xs7tVXM Dec 3 08:04:24 np0005543225 certmonger[41969]: -----END CERTIFICATE----- Dec 3 08:04:24 np0005543225 certmonger[41969]: ". Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Certificate submission still ongoing. Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Certificate submission postprocessing complete. Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Child status = 0. Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Child output: Dec 3 08:04:24 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFYzCCA8ugAwIBAgIBPDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4\nMDQyM1oXDTI3MTIwNDA4MDQyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBAL9/PA3+80SnEdm8Zg/9gyyT/KqunKQRuD3Y\ntZFC5wUDQ8ELaU4tr/+GwXP2sJs9a+UWEAfO0klc+vLJ/8F7UC0FurDjzTb9A8hq\nFlZqNr19avyHO/MMziK5raZ8aWfauxLtgJIQtcZb++a7NE38xjfCyqKvTRLQbC8P\nIv78mzBeeCCP8GnoIcD6vUze2RVUfzhZ1uUBpz0/c3Jtyx1OcdQbMoqfgEN/8jbU\nDp9NHJ1JL/MxWivOelGV9plScuvv6JDA92z8hx6sLH97etJ14ARj1QNQ3gdCBsfQ\nNNusocIz8uWIkR3C4gJMDd8vNP6iDwNdMqXr5i845YUBEFL7DHUCAwEAAaOCAfQw\nggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCpxQ18wUpqebV26MO9JpRNz\nCdadMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u\ndGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTU0MzIyNS5p\nbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P\nTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTU0MzIyNS5p\nbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAdzDu6yNHCmFX\nXceYcMXsaeLoF/ZRfOE4WilfAWXLc4rt4sQdktR2r77O4Kd3nox/y+5DgemWUkL9\nMtma52wTVnwG/bdeC5cAtHjpa4PBkvYK9qo2nEMD5TbnW1kBkGOXZG0SFOvngKjK\nKNJQ1dRxsVeDXZ5+WnPPuRGEWR/hSXrqX3bspBFoUxtcomJAgegqcF1Wf2dcuaFE\nQt/6Z58kkl+D/2wGMANS6b7xWY/NlCsy6NnBDrNx3nQwyshIaAaYpgCKD2x4Jic4\nbwQFgpHVHuO74xVnR0phG6FAh57ECVgzvI6RMhnysJftPWH2gy4Z9X4eqKZeLgyf\n5pxumscZl2aDyjS6Kn+P1RojJbnyjdUsok1iHebrwCZb1wVM2SdvG/gsaRPjtXDk\n116w12m8gNEuaguaXpEcKrcbzMQbYTBHbUW3u30hM87bExsKZXkSIr1lZi5RmWVL\nOQdNNEgYcwNgt0QVfYg14SuGAcVuispqvpfXQTX73U7Q8xs7tVXM\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:04:24 np0005543225 certmonger[38530]: " Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:04:24 np0005543225 certmonger[38530]: MIIFYzCCA8ugAwIBAgIBPDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:24 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:24 np0005543225 certmonger[38530]: MDQyM1oXDTI3MTIwNDA4MDQyM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:24 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:24 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAL9/PA3+80SnEdm8Zg/9gyyT/KqunKQRuD3Y Dec 3 08:04:24 np0005543225 certmonger[38530]: tZFC5wUDQ8ELaU4tr/+GwXP2sJs9a+UWEAfO0klc+vLJ/8F7UC0FurDjzTb9A8hq Dec 3 08:04:24 np0005543225 certmonger[38530]: FlZqNr19avyHO/MMziK5raZ8aWfauxLtgJIQtcZb++a7NE38xjfCyqKvTRLQbC8P Dec 3 08:04:24 np0005543225 certmonger[38530]: Iv78mzBeeCCP8GnoIcD6vUze2RVUfzhZ1uUBpz0/c3Jtyx1OcdQbMoqfgEN/8jbU Dec 3 08:04:24 np0005543225 certmonger[38530]: Dp9NHJ1JL/MxWivOelGV9plScuvv6JDA92z8hx6sLH97etJ14ARj1QNQ3gdCBsfQ Dec 3 08:04:24 np0005543225 certmonger[38530]: NNusocIz8uWIkR3C4gJMDd8vNP6iDwNdMqXr5i845YUBEFL7DHUCAwEAAaOCAfQw Dec 3 08:04:24 np0005543225 certmonger[38530]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:24 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:24 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:24 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:24 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:24 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCpxQ18wUpqebV26MO9JpRNz Dec 3 08:04:24 np0005543225 certmonger[38530]: CdadMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:24 np0005543225 certmonger[38530]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTU0MzIyNS5p Dec 3 08:04:24 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:24 np0005543225 certmonger[38530]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTU0MzIyNS5p Dec 3 08:04:24 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAdzDu6yNHCmFX Dec 3 08:04:24 np0005543225 certmonger[38530]: XceYcMXsaeLoF/ZRfOE4WilfAWXLc4rt4sQdktR2r77O4Kd3nox/y+5DgemWUkL9 Dec 3 08:04:24 np0005543225 certmonger[38530]: Mtma52wTVnwG/bdeC5cAtHjpa4PBkvYK9qo2nEMD5TbnW1kBkGOXZG0SFOvngKjK Dec 3 08:04:24 np0005543225 certmonger[38530]: KNJQ1dRxsVeDXZ5+WnPPuRGEWR/hSXrqX3bspBFoUxtcomJAgegqcF1Wf2dcuaFE Dec 3 08:04:24 np0005543225 certmonger[38530]: Qt/6Z58kkl+D/2wGMANS6b7xWY/NlCsy6NnBDrNx3nQwyshIaAaYpgCKD2x4Jic4 Dec 3 08:04:24 np0005543225 certmonger[38530]: bwQFgpHVHuO74xVnR0phG6FAh57ECVgzvI6RMhnysJftPWH2gy4Z9X4eqKZeLgyf Dec 3 08:04:24 np0005543225 certmonger[38530]: 5pxumscZl2aDyjS6Kn+P1RojJbnyjdUsok1iHebrwCZb1wVM2SdvG/gsaRPjtXDk Dec 3 08:04:24 np0005543225 certmonger[38530]: 116w12m8gNEuaguaXpEcKrcbzMQbYTBHbUW3u30hM87bExsKZXkSIr1lZi5RmWVL Dec 3 08:04:24 np0005543225 certmonger[38530]: OQdNNEgYcwNgt0QVfYg14SuGAcVuispqvpfXQTX73U7Q8xs7tVXM Dec 3 08:04:24 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:04:24 np0005543225 certmonger[38530]: ". Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] No hooks set for pre-save command. Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] No hooks set for post-save command. Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:24 np0005543225 certmonger[41973]: Certificate in file "/etc/pki/tls/certs/neutron_ovn.crt" issued by CA and saved. Dec 3 08:04:24 np0005543225 certmonger[38530]: 2025-12-03 08:04:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080422 Dec 3 08:04:25 np0005543225 python3[41989]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:04:25 np0005543225 python3[42009]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:28 np0005543225 python3[42026]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:31 np0005543225 python3[42043]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:32 np0005543225 python3[42059]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:32 np0005543225 python3[42075]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:33 np0005543225 sshd[42094]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:04:33 np0005543225 python3[42093]: ansible-certificate_request Invoked with name=libvirt-vnc-client-cert dns=['np0005543225.internalapi.ooo.test'] principal=['libvirt-vnc/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/libvirt-vnc-client-cert.crt"#012service_key="/etc/pki/tls/private/libvirt-vnc-client-cert.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:04:33 np0005543225 certmonger[42105]: " for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_REQ_PRINCIPAL" to "libvirt-vnc/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:04:33 np0005543225 certmonger[42105]: " for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:33 np0005543225 certmonger[42105]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:04:33 np0005543225 certmonger[42105]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAo14QI7h1 Dec 3 08:04:33 np0005543225 certmonger[42105]: ZfrAMuojjQDRmc/O9Iy4ZxwlSe2q17+8Bb16bl6GaVls5BqKPJ/H35V0Cp5Z3Cke Dec 3 08:04:33 np0005543225 certmonger[42105]: xx+SnEKgFa7FxzctzNzV3nfBwCL8Y/7AxhZITUNUooSgQ1Xw0TvakuWiSA/b1bcJ Dec 3 08:04:33 np0005543225 certmonger[42105]: fO0JQnM0UAbTFrBhLZ4duJHJcP6QVKN9HOGxGBmhBxw9mvskYEGn36+fMZih3qy/ Dec 3 08:04:33 np0005543225 certmonger[42105]: Cy/+8Kl3WuTGooFYPvypjq0QseSxb5nh0egPYkvb1tCZ6utP1Hv5uTmV/aHBUEq6 Dec 3 08:04:33 np0005543225 certmonger[42105]: pIVYyLcVEp85hoovTQBG2YgUhVwHNBORIwT2hh//WTy7/E0pWKp7724C/299uY4Z Dec 3 08:04:33 np0005543225 certmonger[42105]: z6bzJxD8tNhGcQIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:33 np0005543225 certmonger[42105]: ADAAMwAwADgAMAA0ADMAMzCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Dec 3 08:04:33 np0005543225 certmonger[42105]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:04:33 np0005543225 certmonger[42105]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZuYy9ucDAwMDU1NDMyMjUu Dec 3 08:04:33 np0005543225 certmonger[42105]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Dec 3 08:04:33 np0005543225 certmonger[42105]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5jGyFucDAwMDU1NDMyMjUu Dec 3 08:04:33 np0005543225 certmonger[42105]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Dec 3 08:04:33 np0005543225 certmonger[42105]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFFT2HE8kZi6ActruxcB+Y7O/5rVi Dec 3 08:04:33 np0005543225 certmonger[42105]: MA0GCSqGSIb3DQEBCwUAA4IBAQCf4qlWKprjHf/PcKpvHLDo8BZvXQ2LGMbsKVZ/ Dec 3 08:04:33 np0005543225 certmonger[42105]: x7FLIWqWC3mNZu8ezSpFlczLMPjBwOPoxPTWhU8yK1/yqCRd0nzFQoiZBB/ev/wE Dec 3 08:04:33 np0005543225 certmonger[42105]: 1y4RcmpDhDpOWnJEwgHPyc86+8zrKnwvSsPYJxJc2SMJKcQXq9r31go0rUd5Ind8 Dec 3 08:04:33 np0005543225 certmonger[42105]: gBqQn2JM6I8NjYGiSOkCKFvd/0i1DuPRshs4GQh3s80XL7iKXcPij2ydodxFwWb8 Dec 3 08:04:33 np0005543225 certmonger[42105]: ghYCAyQCQbjeFZLLX/QYa+jTvcGAQFvBeMtQjiBtbm3AMXDqg+2QpTztMChkDMPu Dec 3 08:04:33 np0005543225 certmonger[42105]: ZVuTS/dw+TdWaGNhfnFTgrfkoDYym8Tcjo3XEQ/o4ebXzAqp Dec 3 08:04:33 np0005543225 certmonger[42105]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:33 np0005543225 certmonger[42105]: " for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCjXhAjuHVl+sAy6iONANGZz870jLhnHCVJ7arXv7wFvXpuXoZpWWzkGoo8n8fflXQKnlncKR7HH5KcQqAVrsXHNy3M3NXed8HAIvxj/sDGFkhNQ1SihKBDVfDRO9qS5aJID9vVtwl87QlCczRQBtMWsGEtnh24kclw/pBUo30c4bEYGaEHHD2a+yRgQaffr58xmKHerL8LL/7wqXda5MaigVg+/KmOrRCx5LFvmeHR6A9iS9vW0Jnq60/Ue/m5OZX9ocFQSrqkhVjItxUSnzmGii9NAEbZiBSFXAc0E5EjBPaGH/9ZPLv8TSlYqnvvbgL/b325jhnPpvMnEPy02EZxAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEADxOY/1gxx4g5chCeEx6IkFKih0OzBif1c2j4OkU8/h7mplqYhgluqGdMYvEPq+g1br1FCcHAysjg2r9KW7szMEpV1fVg/F3sG6Wwh+V4w7nMB4g0d5Vr+dihizhkJ0eK1M30IHZ3dUk4ITdrGhzHW9ZRl37GErMJi49dlIV4p18BNR7nFoJJdvi4OECq2B0zPq/oxZAAvgBY6/KRwRGN0qOUbXrj4t895OWOGHhxImnARnGpT7rewcwCLDaVW8y+EOTIhuA37lai6O7qaGaWSizsJZ4oVJfTuhYjk29K8fA1Yp5jXEogdRnd5JMQ6WVv3PihlOmJdj5l2rskbBCiOw==" for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAo14QI7h1ZfrAMuojjQDRmc/O9Iy4ZxwlSe2q17+8Bb16bl6GaVls5BqKPJ/H35V0Cp5Z3Ckexx+SnEKgFa7FxzctzNzV3nfBwCL8Y/7AxhZITUNUooSgQ1Xw0TvakuWiSA/b1bcJfO0JQnM0UAbTFrBhLZ4duJHJcP6QVKN9HOGxGBmhBxw9mvskYEGn36+fMZih3qy/Cy/+8Kl3WuTGooFYPvypjq0QseSxb5nh0egPYkvb1tCZ6utP1Hv5uTmV/aHBUEq6pIVYyLcVEp85hoovTQBG2YgUhVwHNBORIwT2hh//WTy7/E0pWKp7724C/299uY4Zz6bzJxD8tNhGcQIDAQAB" for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:33 np0005543225 certmonger[42105]: 2025-12-03 08:04:33 [42105] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:33 np0005543225 certmonger[38530]: 2025-12-03 08:04:33 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:33 np0005543225 certmonger[42105]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:04:34 np0005543225 certmonger[42105]: Certificate: "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" Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Certificate submission still ongoing. Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Certificate submission attempt complete. Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Child status = 0. Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Child output: Dec 3 08:04:34 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:04:34 np0005543225 certmonger[38530]: MIIFYzCCA8ugAwIBAgIBQTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:34 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:34 np0005543225 certmonger[38530]: MDQzNFoXDTI3MTIwNDA4MDQzNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:34 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:34 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAKNeECO4dWX6wDLqI40A0ZnPzvSMuGccJUnt Dec 3 08:04:34 np0005543225 certmonger[38530]: qte/vAW9em5ehmlZbOQaijyfx9+VdAqeWdwpHscfkpxCoBWuxcc3Lczc1d53wcAi Dec 3 08:04:34 np0005543225 certmonger[38530]: /GP+wMYWSE1DVKKEoENV8NE72pLlokgP29W3CXztCUJzNFAG0xawYS2eHbiRyXD+ Dec 3 08:04:34 np0005543225 certmonger[38530]: kFSjfRzhsRgZoQccPZr7JGBBp9+vnzGYod6svwsv/vCpd1rkxqKBWD78qY6tELHk Dec 3 08:04:34 np0005543225 certmonger[38530]: sW+Z4dHoD2JL29bQmerrT9R7+bk5lf2hwVBKuqSFWMi3FRKfOYaKL00ARtmIFIVc Dec 3 08:04:34 np0005543225 certmonger[38530]: BzQTkSME9oYf/1k8u/xNKViqe+9uAv9vfbmOGc+m8ycQ/LTYRnECAwEAAaOCAfQw Dec 3 08:04:34 np0005543225 certmonger[38530]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:34 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:34 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:34 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:34 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:34 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFIaXNyv8N2/3eWyx4Io9aApD Dec 3 08:04:34 np0005543225 certmonger[38530]: HdhVMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:34 np0005543225 certmonger[38530]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTU0MzIyNS5p Dec 3 08:04:34 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:34 np0005543225 certmonger[38530]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTU0MzIyNS5p Dec 3 08:04:34 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAFyp+BHG9njp6 Dec 3 08:04:34 np0005543225 certmonger[38530]: CgCzEgIDRYiOS5icOGYktiiCJMRgbSkEOBxiKK1fbtmVsKRfwx5fDyhFh3kr2P7s Dec 3 08:04:34 np0005543225 certmonger[38530]: 6M9qqnkNjsLzzm84xQHeIXXnGIysJUxUElRBLxlEUOnYtHwHrkbzUzVBOoHu7PhF Dec 3 08:04:34 np0005543225 certmonger[38530]: t8PI946A3zz40sfy7sdgB3yNJM4xI7skkNqsFYuwbeXXK+1c0d9xOh6v8YcQShBU Dec 3 08:04:34 np0005543225 certmonger[38530]: 1Dxbt5wnLolVtGyY/d5CoTTqz8RkvKB0pYjI7LfxrVBka0uVz53X1rAZXEoGRUs5 Dec 3 08:04:34 np0005543225 certmonger[38530]: Upc7qkIB3ygaiMGwQSShjL/izpZJ+l4KuuAMsxgsE/psTNK3ZJqHLgduY7qs1n8C Dec 3 08:04:34 np0005543225 certmonger[38530]: LsRyq8vY0+txLEZ8H8FkQkfTav8A10no04oFSSaxXN1efO9aFwZp0A06TR3hranL Dec 3 08:04:34 np0005543225 certmonger[38530]: jfKURdFu9ek0h9BYuBaVFunp33vQ/2xb+r+mFHQRcpfRjZla5ovAAfiI+VTYsXNu Dec 3 08:04:34 np0005543225 certmonger[38530]: vrWXoOKiFjIwjXv7HE3de5/lFJnaHfLLzY1KHGIaiUosa5/Snh8P Dec 3 08:04:34 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:04:34 np0005543225 certmonger[38530]: " Dec 3 08:04:34 np0005543225 certmonger[42107]: 2025-12-03 08:04:34 [42107] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:04:34 np0005543225 certmonger[42107]: MIIFYzCCA8ugAwIBAgIBQTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:34 np0005543225 certmonger[42107]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:34 np0005543225 certmonger[42107]: MDQzNFoXDTI3MTIwNDA4MDQzNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:34 np0005543225 certmonger[42107]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:34 np0005543225 certmonger[42107]: hvcNAQEBBQADggEPADCCAQoCggEBAKNeECO4dWX6wDLqI40A0ZnPzvSMuGccJUnt Dec 3 08:04:34 np0005543225 certmonger[42107]: qte/vAW9em5ehmlZbOQaijyfx9+VdAqeWdwpHscfkpxCoBWuxcc3Lczc1d53wcAi Dec 3 08:04:34 np0005543225 certmonger[42107]: /GP+wMYWSE1DVKKEoENV8NE72pLlokgP29W3CXztCUJzNFAG0xawYS2eHbiRyXD+ Dec 3 08:04:34 np0005543225 certmonger[42107]: kFSjfRzhsRgZoQccPZr7JGBBp9+vnzGYod6svwsv/vCpd1rkxqKBWD78qY6tELHk Dec 3 08:04:34 np0005543225 certmonger[42107]: sW+Z4dHoD2JL29bQmerrT9R7+bk5lf2hwVBKuqSFWMi3FRKfOYaKL00ARtmIFIVc Dec 3 08:04:34 np0005543225 certmonger[42107]: BzQTkSME9oYf/1k8u/xNKViqe+9uAv9vfbmOGc+m8ycQ/LTYRnECAwEAAaOCAfQw Dec 3 08:04:34 np0005543225 certmonger[42107]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:34 np0005543225 certmonger[42107]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:34 np0005543225 certmonger[42107]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:34 np0005543225 certmonger[42107]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:34 np0005543225 certmonger[42107]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:34 np0005543225 certmonger[42107]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFIaXNyv8N2/3eWyx4Io9aApD Dec 3 08:04:34 np0005543225 certmonger[42107]: HdhVMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:34 np0005543225 certmonger[42107]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTU0MzIyNS5p Dec 3 08:04:34 np0005543225 certmonger[42107]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:34 np0005543225 certmonger[42107]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTU0MzIyNS5p Dec 3 08:04:34 np0005543225 certmonger[42107]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAFyp+BHG9njp6 Dec 3 08:04:34 np0005543225 certmonger[42107]: CgCzEgIDRYiOS5icOGYktiiCJMRgbSkEOBxiKK1fbtmVsKRfwx5fDyhFh3kr2P7s Dec 3 08:04:34 np0005543225 certmonger[42107]: 6M9qqnkNjsLzzm84xQHeIXXnGIysJUxUElRBLxlEUOnYtHwHrkbzUzVBOoHu7PhF Dec 3 08:04:34 np0005543225 certmonger[42107]: t8PI946A3zz40sfy7sdgB3yNJM4xI7skkNqsFYuwbeXXK+1c0d9xOh6v8YcQShBU Dec 3 08:04:34 np0005543225 certmonger[42107]: 1Dxbt5wnLolVtGyY/d5CoTTqz8RkvKB0pYjI7LfxrVBka0uVz53X1rAZXEoGRUs5 Dec 3 08:04:34 np0005543225 certmonger[42107]: Upc7qkIB3ygaiMGwQSShjL/izpZJ+l4KuuAMsxgsE/psTNK3ZJqHLgduY7qs1n8C Dec 3 08:04:34 np0005543225 certmonger[42107]: LsRyq8vY0+txLEZ8H8FkQkfTav8A10no04oFSSaxXN1efO9aFwZp0A06TR3hranL Dec 3 08:04:34 np0005543225 certmonger[42107]: jfKURdFu9ek0h9BYuBaVFunp33vQ/2xb+r+mFHQRcpfRjZla5ovAAfiI+VTYsXNu Dec 3 08:04:34 np0005543225 certmonger[42107]: vrWXoOKiFjIwjXv7HE3de5/lFJnaHfLLzY1KHGIaiUosa5/Snh8P Dec 3 08:04:34 np0005543225 certmonger[42107]: -----END CERTIFICATE----- Dec 3 08:04:34 np0005543225 certmonger[42107]: ". Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Certificate submission still ongoing. Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Certificate submission postprocessing complete. Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Child status = 0. Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Child output: Dec 3 08:04:34 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nvrWXoOKiFjIwjXv7HE3de5/lFJnaHfLLzY1KHGIaiUosa5/Snh8P\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:04:34 np0005543225 certmonger[38530]: " Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:04:34 np0005543225 certmonger[38530]: MIIFYzCCA8ugAwIBAgIBQTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:34 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:34 np0005543225 certmonger[38530]: MDQzNFoXDTI3MTIwNDA4MDQzNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:34 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:34 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAKNeECO4dWX6wDLqI40A0ZnPzvSMuGccJUnt Dec 3 08:04:34 np0005543225 certmonger[38530]: qte/vAW9em5ehmlZbOQaijyfx9+VdAqeWdwpHscfkpxCoBWuxcc3Lczc1d53wcAi Dec 3 08:04:34 np0005543225 certmonger[38530]: /GP+wMYWSE1DVKKEoENV8NE72pLlokgP29W3CXztCUJzNFAG0xawYS2eHbiRyXD+ Dec 3 08:04:34 np0005543225 certmonger[38530]: kFSjfRzhsRgZoQccPZr7JGBBp9+vnzGYod6svwsv/vCpd1rkxqKBWD78qY6tELHk Dec 3 08:04:34 np0005543225 certmonger[38530]: sW+Z4dHoD2JL29bQmerrT9R7+bk5lf2hwVBKuqSFWMi3FRKfOYaKL00ARtmIFIVc Dec 3 08:04:34 np0005543225 certmonger[38530]: BzQTkSME9oYf/1k8u/xNKViqe+9uAv9vfbmOGc+m8ycQ/LTYRnECAwEAAaOCAfQw Dec 3 08:04:34 np0005543225 certmonger[38530]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:34 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:34 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:34 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:34 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:34 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFIaXNyv8N2/3eWyx4Io9aApD Dec 3 08:04:34 np0005543225 certmonger[38530]: HdhVMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:34 np0005543225 certmonger[38530]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTU0MzIyNS5p Dec 3 08:04:34 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:34 np0005543225 certmonger[38530]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTU0MzIyNS5p Dec 3 08:04:34 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAFyp+BHG9njp6 Dec 3 08:04:34 np0005543225 certmonger[38530]: CgCzEgIDRYiOS5icOGYktiiCJMRgbSkEOBxiKK1fbtmVsKRfwx5fDyhFh3kr2P7s Dec 3 08:04:34 np0005543225 certmonger[38530]: 6M9qqnkNjsLzzm84xQHeIXXnGIysJUxUElRBLxlEUOnYtHwHrkbzUzVBOoHu7PhF Dec 3 08:04:34 np0005543225 certmonger[38530]: t8PI946A3zz40sfy7sdgB3yNJM4xI7skkNqsFYuwbeXXK+1c0d9xOh6v8YcQShBU Dec 3 08:04:34 np0005543225 certmonger[38530]: 1Dxbt5wnLolVtGyY/d5CoTTqz8RkvKB0pYjI7LfxrVBka0uVz53X1rAZXEoGRUs5 Dec 3 08:04:34 np0005543225 certmonger[38530]: Upc7qkIB3ygaiMGwQSShjL/izpZJ+l4KuuAMsxgsE/psTNK3ZJqHLgduY7qs1n8C Dec 3 08:04:34 np0005543225 certmonger[38530]: LsRyq8vY0+txLEZ8H8FkQkfTav8A10no04oFSSaxXN1efO9aFwZp0A06TR3hranL Dec 3 08:04:34 np0005543225 certmonger[38530]: jfKURdFu9ek0h9BYuBaVFunp33vQ/2xb+r+mFHQRcpfRjZla5ovAAfiI+VTYsXNu Dec 3 08:04:34 np0005543225 certmonger[38530]: vrWXoOKiFjIwjXv7HE3de5/lFJnaHfLLzY1KHGIaiUosa5/Snh8P Dec 3 08:04:34 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:04:34 np0005543225 certmonger[38530]: ". Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] No hooks set for pre-save command. Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:34 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:34 np0005543225 certmonger[42184]: Certificate in file "/etc/pki/tls/certs/libvirt-vnc-client-cert.crt" issued by CA and saved. Dec 3 08:04:34 np0005543225 certmonger[38530]: 2025-12-03 08:04:34 [38530] Wrote to /var/lib/certmonger/requests/20251203080433 Dec 3 08:04:35 np0005543225 python3[42200]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:04:35 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:36 np0005543225 python3[42220]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:40 np0005543225 python3[42237]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:43 np0005543225 python3[42266]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:43 np0005543225 python3[42282]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:44 np0005543225 python3[42298]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:44 np0005543225 python3[42316]: ansible-certificate_request Invoked with name=novnc-proxy dns=['np0005543225.internalapi.ooo.test'] principal=['novnc-proxy/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/novnc-proxy.crt"#012service_key="/etc/pki/tls/private/novnc-proxy.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:04:44 np0005543225 certmonger[38530]: 2025-12-03 08:04:44 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:44 np0005543225 certmonger[38530]: 2025-12-03 08:04:44 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:44 np0005543225 certmonger[38530]: 2025-12-03 08:04:44 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:44 np0005543225 certmonger[38530]: 2025-12-03 08:04:44 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:44 np0005543225 certmonger[38530]: 2025-12-03 08:04:44 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:44 np0005543225 certmonger[38530]: 2025-12-03 08:04:44 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:44 np0005543225 certmonger[38530]: 2025-12-03 08:04:44 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:44 np0005543225 certmonger[38530]: 2025-12-03 08:04:44 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:44 np0005543225 certmonger[38530]: 2025-12-03 08:04:44 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:04:45 np0005543225 certmonger[42326]: " for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_REQ_PRINCIPAL" to "novnc-proxy/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:04:45 np0005543225 certmonger[42326]: " for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:45 np0005543225 certmonger[42326]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:04:45 np0005543225 certmonger[42326]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA7lesIXVG Dec 3 08:04:45 np0005543225 certmonger[42326]: sh0xUpDN24TDzV5/j3+Z82Q8FgNLX3X24GtlkXkM3yPgjt4J2oavUQHHtqgpdVsA Dec 3 08:04:45 np0005543225 certmonger[42326]: BPgDaUSStCTBy5bya0Yzizeu/1p4t01Ysog0ACqu+43p9JUjSL7vXt3y8pgBOWGG Dec 3 08:04:45 np0005543225 certmonger[42326]: oQrXUSomdUP2q/GCFZ1Rk0SP11sDaCthf41epA8Qh5Kcz68cMy73PDJ0GC7BQUf2 Dec 3 08:04:45 np0005543225 certmonger[42326]: rTt2rLDEA4N3PdTxIBVLILGxUeXEjz/NQyX39LTju+J65fhSYxhGEDCqMEUL06Lu Dec 3 08:04:45 np0005543225 certmonger[42326]: j/lNQr3tSWaVMSEWveXNUrqmL0e1mJ2SyIL59iKfLNCik3BS2YaL7vM1a/CE9XcX Dec 3 08:04:45 np0005543225 certmonger[42326]: LCzW9aVanR/pCwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:45 np0005543225 certmonger[42326]: ADAAMwAwADgAMAA0ADQANDCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Dec 3 08:04:45 np0005543225 certmonger[42326]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:04:45 np0005543225 certmonger[42326]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94eS9ucDAwMDU1NDMyMjUu Dec 3 08:04:45 np0005543225 certmonger[42326]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Dec 3 08:04:45 np0005543225 certmonger[42326]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5GyFucDAwMDU1NDMyMjUu Dec 3 08:04:45 np0005543225 certmonger[42326]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Dec 3 08:04:45 np0005543225 certmonger[42326]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFFT2HE8kZi6ActruxcB+Y7O/5rVi Dec 3 08:04:45 np0005543225 certmonger[42326]: MA0GCSqGSIb3DQEBCwUAA4IBAQDiocJRn0HMoSGXDC5ZqcckVJ8M+DUtf5iHzK5U Dec 3 08:04:45 np0005543225 certmonger[42326]: dlHHFnc3PUToacw+mQFHmmusmIuiE8Y+uoNJNaL0BjL878kMbe9xqxQC+G3cLYZf Dec 3 08:04:45 np0005543225 certmonger[42326]: XW6m4eLYA3BgMMb+hgLTVY1Bs6xiIfEqBIXpL1mOFnJ3ST7HykOpDST/DUJZILXI Dec 3 08:04:45 np0005543225 certmonger[42326]: zVaAN/qo4EuMjy+z3rvM6Z2Ij5Rf1PucEuFqaGp+CnteAWAPCpsU6eiAPNBYmz/E Dec 3 08:04:45 np0005543225 certmonger[42326]: Uq4ThEsRnzjz6BYt86+bK5X1tMDpBjNykJHH2NVsq3FdfdZJqlyL5lqP0HKZmgyu Dec 3 08:04:45 np0005543225 certmonger[42326]: QRtHRBKkS1NRSXHYVt7lGKXh04mXPArKqeMbxjQfdz18A6Br Dec 3 08:04:45 np0005543225 certmonger[42326]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:45 np0005543225 certmonger[42326]: " for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA7lesIXVGsh0xUpDN24TDzV5/j3+Z82Q8FgNLX3X24GtlkXkM3yPgjt4J2oavUQHHtqgpdVsABPgDaUSStCTBy5bya0Yzizeu/1p4t01Ysog0ACqu+43p9JUjSL7vXt3y8pgBOWGGoQrXUSomdUP2q/GCFZ1Rk0SP11sDaCthf41epA8Qh5Kcz68cMy73PDJ0GC7BQUf2rTt2rLDEA4N3PdTxIBVLILGxUeXEjz/NQyX39LTju+J65fhSYxhGEDCqMEUL06Luj/lNQr3tSWaVMSEWveXNUrqmL0e1mJ2SyIL59iKfLNCik3BS2YaL7vM1a/CE9XcXLCzW9aVanR/pCwIDAQAB" for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:45 np0005543225 certmonger[42326]: 2025-12-03 08:04:45 [42326] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[42326]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:04:45 np0005543225 certmonger[42326]: Certificate: "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" Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Certificate submission still ongoing. Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Certificate submission attempt complete. Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Child status = 0. Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Child output: Dec 3 08:04:45 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:04:45 np0005543225 certmonger[38530]: MIIFYzCCA8ugAwIBAgIBQzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:45 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:45 np0005543225 certmonger[38530]: MDQ0NVoXDTI3MTIwNDA4MDQ0NVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:45 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:45 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAO5XrCF1RrIdMVKQzduEw81ef49/mfNkPBYD Dec 3 08:04:45 np0005543225 certmonger[38530]: S1919uBrZZF5DN8j4I7eCdqGr1EBx7aoKXVbAAT4A2lEkrQkwcuW8mtGM4s3rv9a Dec 3 08:04:45 np0005543225 certmonger[38530]: eLdNWLKINAAqrvuN6fSVI0i+717d8vKYATlhhqEK11EqJnVD9qvxghWdUZNEj9db Dec 3 08:04:45 np0005543225 certmonger[38530]: A2grYX+NXqQPEIeSnM+vHDMu9zwydBguwUFH9q07dqywxAODdz3U8SAVSyCxsVHl Dec 3 08:04:45 np0005543225 certmonger[38530]: xI8/zUMl9/S047vieuX4UmMYRhAwqjBFC9Oi7o/5TUK97UlmlTEhFr3lzVK6pi9H Dec 3 08:04:45 np0005543225 certmonger[38530]: tZidksiC+fYinyzQopNwUtmGi+7zNWvwhPV3Fyws1vWlWp0f6QsCAwEAAaOCAfQw Dec 3 08:04:45 np0005543225 certmonger[38530]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:45 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:45 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:45 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:45 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:45 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEh4THkzRUZa5X168oPAFuDW Dec 3 08:04:45 np0005543225 certmonger[38530]: eLbhMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:45 np0005543225 certmonger[38530]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTU0MzIyNS5p Dec 3 08:04:45 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:45 np0005543225 certmonger[38530]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTU0MzIyNS5p Dec 3 08:04:45 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAPRbe6EObiYUx Dec 3 08:04:45 np0005543225 certmonger[38530]: A6E4fWb8WPosnHSo6dh7pqZFQ9J2G6LR2sagUw/Ilq6H1jLDvRYSIh+Xi0efsW2U Dec 3 08:04:45 np0005543225 certmonger[38530]: 6AbIFUZAapHZbVFOmqsHkTn4O/424HOaIJSQ6wnd+YGJOscrVLozmiftchiV00xc Dec 3 08:04:45 np0005543225 certmonger[38530]: xx/iVnebB5DYc4zip8UaKZpb/rK0PgMHGD+Pa4vRpKX2RaUdQ9t9B9vvGW+KgHbB Dec 3 08:04:45 np0005543225 certmonger[38530]: 4FB22XVp4UiwSYkcH0IFII0mdFJweAUMAHPnZQf+jajY1LTXVbEoDLMTcMWnCjTQ Dec 3 08:04:45 np0005543225 certmonger[38530]: gKVq6C9hBRjLpJf0fAo5FU1/Gf8O7vq795WflZ9qH0IjduqKizqHzG/azHM4eoXz Dec 3 08:04:45 np0005543225 certmonger[38530]: d18JXtThn+tIIh3FImNgupSF4F5hD+ZZZBeWhjM4ulOOdtzXQzJ7gndGGnG8emNj Dec 3 08:04:45 np0005543225 certmonger[38530]: OvxahgJvEOctK9Rg/CpYSnn7F3NX/VrchC1YiDyDh3bzYdbH9mdEVeIGC+d96ScU Dec 3 08:04:45 np0005543225 certmonger[38530]: 8lJojZCc62y2FI+QwH/0paMou86mehdX4fRqQoKMLR1ydwrpYu8N Dec 3 08:04:45 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:04:45 np0005543225 certmonger[38530]: " Dec 3 08:04:45 np0005543225 certmonger[42328]: 2025-12-03 08:04:45 [42328] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:04:45 np0005543225 certmonger[42328]: MIIFYzCCA8ugAwIBAgIBQzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:45 np0005543225 certmonger[42328]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:45 np0005543225 certmonger[42328]: MDQ0NVoXDTI3MTIwNDA4MDQ0NVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:45 np0005543225 certmonger[42328]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:45 np0005543225 certmonger[42328]: hvcNAQEBBQADggEPADCCAQoCggEBAO5XrCF1RrIdMVKQzduEw81ef49/mfNkPBYD Dec 3 08:04:45 np0005543225 certmonger[42328]: S1919uBrZZF5DN8j4I7eCdqGr1EBx7aoKXVbAAT4A2lEkrQkwcuW8mtGM4s3rv9a Dec 3 08:04:45 np0005543225 certmonger[42328]: eLdNWLKINAAqrvuN6fSVI0i+717d8vKYATlhhqEK11EqJnVD9qvxghWdUZNEj9db Dec 3 08:04:45 np0005543225 certmonger[42328]: A2grYX+NXqQPEIeSnM+vHDMu9zwydBguwUFH9q07dqywxAODdz3U8SAVSyCxsVHl Dec 3 08:04:45 np0005543225 certmonger[42328]: xI8/zUMl9/S047vieuX4UmMYRhAwqjBFC9Oi7o/5TUK97UlmlTEhFr3lzVK6pi9H Dec 3 08:04:45 np0005543225 certmonger[42328]: tZidksiC+fYinyzQopNwUtmGi+7zNWvwhPV3Fyws1vWlWp0f6QsCAwEAAaOCAfQw Dec 3 08:04:45 np0005543225 certmonger[42328]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:45 np0005543225 certmonger[42328]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:45 np0005543225 certmonger[42328]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:45 np0005543225 certmonger[42328]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:45 np0005543225 certmonger[42328]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:45 np0005543225 certmonger[42328]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEh4THkzRUZa5X168oPAFuDW Dec 3 08:04:45 np0005543225 certmonger[42328]: eLbhMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:45 np0005543225 certmonger[42328]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTU0MzIyNS5p Dec 3 08:04:45 np0005543225 certmonger[42328]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:45 np0005543225 certmonger[42328]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTU0MzIyNS5p Dec 3 08:04:45 np0005543225 certmonger[42328]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAPRbe6EObiYUx Dec 3 08:04:45 np0005543225 certmonger[42328]: A6E4fWb8WPosnHSo6dh7pqZFQ9J2G6LR2sagUw/Ilq6H1jLDvRYSIh+Xi0efsW2U Dec 3 08:04:45 np0005543225 certmonger[42328]: 6AbIFUZAapHZbVFOmqsHkTn4O/424HOaIJSQ6wnd+YGJOscrVLozmiftchiV00xc Dec 3 08:04:45 np0005543225 certmonger[42328]: xx/iVnebB5DYc4zip8UaKZpb/rK0PgMHGD+Pa4vRpKX2RaUdQ9t9B9vvGW+KgHbB Dec 3 08:04:45 np0005543225 certmonger[42328]: 4FB22XVp4UiwSYkcH0IFII0mdFJweAUMAHPnZQf+jajY1LTXVbEoDLMTcMWnCjTQ Dec 3 08:04:45 np0005543225 certmonger[42328]: gKVq6C9hBRjLpJf0fAo5FU1/Gf8O7vq795WflZ9qH0IjduqKizqHzG/azHM4eoXz Dec 3 08:04:45 np0005543225 certmonger[42328]: d18JXtThn+tIIh3FImNgupSF4F5hD+ZZZBeWhjM4ulOOdtzXQzJ7gndGGnG8emNj Dec 3 08:04:45 np0005543225 certmonger[42328]: OvxahgJvEOctK9Rg/CpYSnn7F3NX/VrchC1YiDyDh3bzYdbH9mdEVeIGC+d96ScU Dec 3 08:04:45 np0005543225 certmonger[42328]: 8lJojZCc62y2FI+QwH/0paMou86mehdX4fRqQoKMLR1ydwrpYu8N Dec 3 08:04:45 np0005543225 certmonger[42328]: -----END CERTIFICATE----- Dec 3 08:04:45 np0005543225 certmonger[42328]: ". Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Certificate submission still ongoing. Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Certificate submission postprocessing complete. Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Child status = 0. Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Child output: Dec 3 08:04:45 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n8lJojZCc62y2FI+QwH/0paMou86mehdX4fRqQoKMLR1ydwrpYu8N\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:04:45 np0005543225 certmonger[38530]: " Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:04:45 np0005543225 certmonger[38530]: MIIFYzCCA8ugAwIBAgIBQzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:45 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:45 np0005543225 certmonger[38530]: MDQ0NVoXDTI3MTIwNDA4MDQ0NVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:45 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:45 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAO5XrCF1RrIdMVKQzduEw81ef49/mfNkPBYD Dec 3 08:04:45 np0005543225 certmonger[38530]: S1919uBrZZF5DN8j4I7eCdqGr1EBx7aoKXVbAAT4A2lEkrQkwcuW8mtGM4s3rv9a Dec 3 08:04:45 np0005543225 certmonger[38530]: eLdNWLKINAAqrvuN6fSVI0i+717d8vKYATlhhqEK11EqJnVD9qvxghWdUZNEj9db Dec 3 08:04:45 np0005543225 certmonger[38530]: A2grYX+NXqQPEIeSnM+vHDMu9zwydBguwUFH9q07dqywxAODdz3U8SAVSyCxsVHl Dec 3 08:04:45 np0005543225 certmonger[38530]: xI8/zUMl9/S047vieuX4UmMYRhAwqjBFC9Oi7o/5TUK97UlmlTEhFr3lzVK6pi9H Dec 3 08:04:45 np0005543225 certmonger[38530]: tZidksiC+fYinyzQopNwUtmGi+7zNWvwhPV3Fyws1vWlWp0f6QsCAwEAAaOCAfQw Dec 3 08:04:45 np0005543225 certmonger[38530]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:45 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:45 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:45 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:45 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:45 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEh4THkzRUZa5X168oPAFuDW Dec 3 08:04:45 np0005543225 certmonger[38530]: eLbhMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:45 np0005543225 certmonger[38530]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTU0MzIyNS5p Dec 3 08:04:45 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:45 np0005543225 certmonger[38530]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTU0MzIyNS5p Dec 3 08:04:45 np0005543225 certmonger[38530]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAPRbe6EObiYUx Dec 3 08:04:45 np0005543225 certmonger[38530]: A6E4fWb8WPosnHSo6dh7pqZFQ9J2G6LR2sagUw/Ilq6H1jLDvRYSIh+Xi0efsW2U Dec 3 08:04:45 np0005543225 certmonger[38530]: 6AbIFUZAapHZbVFOmqsHkTn4O/424HOaIJSQ6wnd+YGJOscrVLozmiftchiV00xc Dec 3 08:04:45 np0005543225 certmonger[38530]: xx/iVnebB5DYc4zip8UaKZpb/rK0PgMHGD+Pa4vRpKX2RaUdQ9t9B9vvGW+KgHbB Dec 3 08:04:45 np0005543225 certmonger[38530]: 4FB22XVp4UiwSYkcH0IFII0mdFJweAUMAHPnZQf+jajY1LTXVbEoDLMTcMWnCjTQ Dec 3 08:04:45 np0005543225 certmonger[38530]: gKVq6C9hBRjLpJf0fAo5FU1/Gf8O7vq795WflZ9qH0IjduqKizqHzG/azHM4eoXz Dec 3 08:04:45 np0005543225 certmonger[38530]: d18JXtThn+tIIh3FImNgupSF4F5hD+ZZZBeWhjM4ulOOdtzXQzJ7gndGGnG8emNj Dec 3 08:04:45 np0005543225 certmonger[38530]: OvxahgJvEOctK9Rg/CpYSnn7F3NX/VrchC1YiDyDh3bzYdbH9mdEVeIGC+d96ScU Dec 3 08:04:45 np0005543225 certmonger[38530]: 8lJojZCc62y2FI+QwH/0paMou86mehdX4fRqQoKMLR1ydwrpYu8N Dec 3 08:04:45 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:04:45 np0005543225 certmonger[38530]: ". Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] No hooks set for pre-save command. Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 certmonger[38530]: 2025-12-03 08:04:45 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:45 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:45 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:46 np0005543225 certmonger[38530]: 2025-12-03 08:04:46 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:46 np0005543225 certmonger[38530]: 2025-12-03 08:04:46 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:46 np0005543225 certmonger[42406]: Certificate in file "/etc/pki/tls/certs/novnc-proxy.crt" issued by CA and saved. Dec 3 08:04:46 np0005543225 certmonger[38530]: 2025-12-03 08:04:46 [38530] Wrote to /var/lib/certmonger/requests/20251203080444 Dec 3 08:04:46 np0005543225 python3[42422]: ansible-ansible.builtin.service_facts Invoked Dec 3 08:04:46 np0005543225 network[42439]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Dec 3 08:04:46 np0005543225 network[42440]: 'network-scripts' will be removed from distribution in near future. Dec 3 08:04:46 np0005543225 network[42441]: It is advised to switch to 'NetworkManager' instead for network management. Dec 3 08:04:47 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:47 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client.service:23: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:04:50 np0005543225 python3[42559]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:04:51 np0005543225 python3[42579]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:54 np0005543225 python3[42596]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:57 np0005543225 python3[42613]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:57 np0005543225 python3[42629]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:58 np0005543225 python3[42645]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:59 np0005543225 python3[42663]: ansible-certificate_request Invoked with name=ovn_dbs dns=['np0005543225.internalapi.ooo.test'] principal=['ovn_dbs/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:04:59 np0005543225 certmonger[42673]: " for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_dbs/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:04:59 np0005543225 certmonger[42673]: " for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:59 np0005543225 certmonger[42673]: MIID2DCCAsACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:04:59 np0005543225 certmonger[42673]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsR4XAPzV Dec 3 08:04:59 np0005543225 certmonger[42673]: 4h2FYV3d6fUPF85khmWIdQ64KUEfbl6AxW/VYFVRmMCOgAKujG5b97DhFjzQckXu Dec 3 08:04:59 np0005543225 certmonger[42673]: B6eDsiBep3gYb0lAIN1lGzslyiSTEgccESVyeVVFlgZf8W71eN29hklyJuBTZblW Dec 3 08:04:59 np0005543225 certmonger[42673]: zGYDYOXqnYjeaO8lk0P/Z6ehgxe563h7vSwgp0IRiwxZbmHqi5yg+L3M6EHoctOV Dec 3 08:04:59 np0005543225 certmonger[42673]: E8Xzfc5xZ8KO8FR1DZk7C8PXQ7F5O5ONxXBDXOSKpim9S/AznoCh2Nfeyz1xcsaV Dec 3 08:04:59 np0005543225 certmonger[42673]: olE0wxNqkelTgMkRASR0qDQHUl7aes0PLkhvtZ/q1ML7nnWQrNuQXKNgIhhlQAGm Dec 3 08:04:59 np0005543225 certmonger[42673]: Hf49A5LHoTWBOwIDAQABoIIBZTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:59 np0005543225 certmonger[42673]: ADAAMwAwADgAMAA0ADUAOTCCATQGCSqGSIb3DQEJDjGCASUwggEhMAsGA1UdDwQE Dec 3 08:04:59 np0005543225 certmonger[42673]: AwIFoDCBxQYDVR0RBIG9MIG6giFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:04:59 np0005543225 certmonger[42673]: LnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25wMDAwNTU0MzIyNS5pbnRl Dec 3 08:04:59 np0005543225 certmonger[42673]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEFAgKgRzBFoAobCE9PTy5U Dec 3 08:04:59 np0005543225 certmonger[42673]: RVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1NTQzMjI1LmludGVybmFs Dec 3 08:04:59 np0005543225 certmonger[42673]: YXBpLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNV Dec 3 08:04:59 np0005543225 certmonger[42673]: HRMBAf8EAjAAMB0GA1UdDgQWBBRU9hxPJGYugHLa7sXAfmOzv+a1YjANBgkqhkiG Dec 3 08:04:59 np0005543225 certmonger[42673]: 9w0BAQsFAAOCAQEAkYoMjMV0aLXK5ef9NbVO17apwgzU0U8o6Tbizl6C5KpUd7bC Dec 3 08:04:59 np0005543225 certmonger[42673]: s1/VWjdLmypfCmihaTETJzZBkwf7M2+ywfu42TNbEUO0ce0MCBxIDUNJZjJ568aZ Dec 3 08:04:59 np0005543225 certmonger[42673]: fmbxcyB4DRZJVWhkNnvBZ7PFv/dwmNTsaSPPVmZXoY991Az6m/0XzKoahGRmt88p Dec 3 08:04:59 np0005543225 certmonger[42673]: 5LqRdAI19k32noN+ElepaGSpzMwvOccnzSwmwoAzf67MCCvlKhm2wdubgVJ7qJ5x Dec 3 08:04:59 np0005543225 certmonger[42673]: WjAdD5wgVIneCa7K0YYeXief0n7FgZmlt4KMyMjo01j5vTtIgwpMaLwgrFL4+JCM Dec 3 08:04:59 np0005543225 certmonger[42673]: nH0cmeCKEFMPBXrj7w6DcLIWAonEoixJv1zqKg== Dec 3 08:04:59 np0005543225 certmonger[42673]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:59 np0005543225 certmonger[42673]: " for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsR4XAPzV4h2FYV3d6fUPF85khmWIdQ64KUEfbl6AxW/VYFVRmMCOgAKujG5b97DhFjzQckXuB6eDsiBep3gYb0lAIN1lGzslyiSTEgccESVyeVVFlgZf8W71eN29hklyJuBTZblWzGYDYOXqnYjeaO8lk0P/Z6ehgxe563h7vSwgp0IRiwxZbmHqi5yg+L3M6EHoctOVE8Xzfc5xZ8KO8FR1DZk7C8PXQ7F5O5ONxXBDXOSKpim9S/AznoCh2Nfeyz1xcsaVolE0wxNqkelTgMkRASR0qDQHUl7aes0PLkhvtZ/q1ML7nnWQrNuQXKNgIhhlQAGmHf49A5LHoTWBOwIDAQAB" for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:59 np0005543225 certmonger[42673]: 2025-12-03 08:04:59 [42673] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:59 np0005543225 certmonger[38530]: 2025-12-03 08:04:59 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:04:59 np0005543225 certmonger[42673]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:05:00 np0005543225 certmonger[42673]: Certificate: "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" Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Certificate submission still ongoing. Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Certificate submission attempt complete. Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Child status = 0. Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Child output: Dec 3 08:05:00 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:05:00 np0005543225 certmonger[38530]: MIIFWzCCA8OgAwIBAgIBRTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:00 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:00 np0005543225 certmonger[38530]: MDQ1OVoXDTI3MTIwNDA4MDQ1OVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:00 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:00 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBALEeFwD81eIdhWFd3en1DxfOZIZliHUOuClB Dec 3 08:05:00 np0005543225 certmonger[38530]: H25egMVv1WBVUZjAjoACroxuW/ew4RY80HJF7geng7IgXqd4GG9JQCDdZRs7Jcok Dec 3 08:05:00 np0005543225 certmonger[38530]: kxIHHBElcnlVRZYGX/Fu9XjdvYZJcibgU2W5VsxmA2Dl6p2I3mjvJZND/2enoYMX Dec 3 08:05:00 np0005543225 certmonger[38530]: uet4e70sIKdCEYsMWW5h6oucoPi9zOhB6HLTlRPF833OcWfCjvBUdQ2ZOwvD10Ox Dec 3 08:05:00 np0005543225 certmonger[38530]: eTuTjcVwQ1zkiqYpvUvwM56AodjX3ss9cXLGlaJRNMMTapHpU4DJEQEkdKg0B1Je Dec 3 08:05:00 np0005543225 certmonger[38530]: 2nrNDy5Ib7Wf6tTC+551kKzbkFyjYCIYZUABph3+PQOSx6E1gTsCAwEAAaOCAeww Dec 3 08:05:00 np0005543225 certmonger[38530]: ggHoMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:00 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:00 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:00 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:00 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:00 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEV4JiNoltftY1yuCQ2g2J8F Dec 3 08:05:00 np0005543225 certmonger[38530]: JayAMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:00 np0005543225 certmonger[38530]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NTQzMjI1LmludGVy Dec 3 08:05:00 np0005543225 certmonger[38530]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Dec 3 08:05:00 np0005543225 certmonger[38530]: U1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1NDMyMjUuaW50ZXJuYWxh Dec 3 08:05:00 np0005543225 certmonger[38530]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAANQDMiTSqGXUrRly65iFcPb Dec 3 08:05:00 np0005543225 certmonger[38530]: DTgX2nj+PQSK0q8RoL0FGRGBOGTSfJAb/fq/auOSdrX7ieNd9v/qkR6pp9rRDMby Dec 3 08:05:00 np0005543225 certmonger[38530]: 86TSbBsno48uuHWCDBEXDExb0j70r+hUMiw5/d6oQ8+GGdzwkN63U+TNKOW/eGA2 Dec 3 08:05:00 np0005543225 certmonger[38530]: ZhKMaA9hYKyLZkjjXzQrg8vI8HwVJijT0dFvgMOdu3tvuCTZN/322W+ZtLN+Ja2G Dec 3 08:05:00 np0005543225 certmonger[38530]: EfhK4kU1NrIMXRg86qEil5xeZSQSWIvc4H8OqVS41w9qmXZaR87NOu8Nvthyc+lS Dec 3 08:05:00 np0005543225 certmonger[38530]: khXU3BgwlizuziyzWUO4BmdMijHkaGn2tuRVRgzZJYqYFOmfGCZ8MkRMZnw0i7It Dec 3 08:05:00 np0005543225 certmonger[38530]: VcCUl0oCVga4577cJHzC4uKCR1x5k3WcZlcs8nq9lggoQVX707Jo9xE8OKUkNaRB Dec 3 08:05:00 np0005543225 certmonger[38530]: L813w7598Z/KaIkMBiq4ArXbbD8bwGlluSlKKxVzsQYRkqj8A4XwLzDV8DELV8O1 Dec 3 08:05:00 np0005543225 certmonger[38530]: eiyKFO1niaCAJW/bz5oUksEMqkeHtR3QjVnCOFX45w== Dec 3 08:05:00 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:05:00 np0005543225 certmonger[38530]: " Dec 3 08:05:00 np0005543225 certmonger[42675]: 2025-12-03 08:05:00 [42675] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:05:00 np0005543225 certmonger[42675]: MIIFWzCCA8OgAwIBAgIBRTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:00 np0005543225 certmonger[42675]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:00 np0005543225 certmonger[42675]: MDQ1OVoXDTI3MTIwNDA4MDQ1OVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:00 np0005543225 certmonger[42675]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:00 np0005543225 certmonger[42675]: hvcNAQEBBQADggEPADCCAQoCggEBALEeFwD81eIdhWFd3en1DxfOZIZliHUOuClB Dec 3 08:05:00 np0005543225 certmonger[42675]: H25egMVv1WBVUZjAjoACroxuW/ew4RY80HJF7geng7IgXqd4GG9JQCDdZRs7Jcok Dec 3 08:05:00 np0005543225 certmonger[42675]: kxIHHBElcnlVRZYGX/Fu9XjdvYZJcibgU2W5VsxmA2Dl6p2I3mjvJZND/2enoYMX Dec 3 08:05:00 np0005543225 certmonger[42675]: uet4e70sIKdCEYsMWW5h6oucoPi9zOhB6HLTlRPF833OcWfCjvBUdQ2ZOwvD10Ox Dec 3 08:05:00 np0005543225 certmonger[42675]: eTuTjcVwQ1zkiqYpvUvwM56AodjX3ss9cXLGlaJRNMMTapHpU4DJEQEkdKg0B1Je Dec 3 08:05:00 np0005543225 certmonger[42675]: 2nrNDy5Ib7Wf6tTC+551kKzbkFyjYCIYZUABph3+PQOSx6E1gTsCAwEAAaOCAeww Dec 3 08:05:00 np0005543225 certmonger[42675]: ggHoMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:00 np0005543225 certmonger[42675]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:00 np0005543225 certmonger[42675]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:00 np0005543225 certmonger[42675]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:00 np0005543225 certmonger[42675]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:00 np0005543225 certmonger[42675]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEV4JiNoltftY1yuCQ2g2J8F Dec 3 08:05:00 np0005543225 certmonger[42675]: JayAMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:00 np0005543225 certmonger[42675]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NTQzMjI1LmludGVy Dec 3 08:05:00 np0005543225 certmonger[42675]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Dec 3 08:05:00 np0005543225 certmonger[42675]: U1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1NDMyMjUuaW50ZXJuYWxh Dec 3 08:05:00 np0005543225 certmonger[42675]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAANQDMiTSqGXUrRly65iFcPb Dec 3 08:05:00 np0005543225 certmonger[42675]: DTgX2nj+PQSK0q8RoL0FGRGBOGTSfJAb/fq/auOSdrX7ieNd9v/qkR6pp9rRDMby Dec 3 08:05:00 np0005543225 certmonger[42675]: 86TSbBsno48uuHWCDBEXDExb0j70r+hUMiw5/d6oQ8+GGdzwkN63U+TNKOW/eGA2 Dec 3 08:05:00 np0005543225 certmonger[42675]: ZhKMaA9hYKyLZkjjXzQrg8vI8HwVJijT0dFvgMOdu3tvuCTZN/322W+ZtLN+Ja2G Dec 3 08:05:00 np0005543225 certmonger[42675]: EfhK4kU1NrIMXRg86qEil5xeZSQSWIvc4H8OqVS41w9qmXZaR87NOu8Nvthyc+lS Dec 3 08:05:00 np0005543225 certmonger[42675]: khXU3BgwlizuziyzWUO4BmdMijHkaGn2tuRVRgzZJYqYFOmfGCZ8MkRMZnw0i7It Dec 3 08:05:00 np0005543225 certmonger[42675]: VcCUl0oCVga4577cJHzC4uKCR1x5k3WcZlcs8nq9lggoQVX707Jo9xE8OKUkNaRB Dec 3 08:05:00 np0005543225 certmonger[42675]: L813w7598Z/KaIkMBiq4ArXbbD8bwGlluSlKKxVzsQYRkqj8A4XwLzDV8DELV8O1 Dec 3 08:05:00 np0005543225 certmonger[42675]: eiyKFO1niaCAJW/bz5oUksEMqkeHtR3QjVnCOFX45w== Dec 3 08:05:00 np0005543225 certmonger[42675]: -----END CERTIFICATE----- Dec 3 08:05:00 np0005543225 certmonger[42675]: ". Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Certificate submission still ongoing. Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Certificate submission postprocessing complete. Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Child status = 0. Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Child output: Dec 3 08:05:00 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\neiyKFO1niaCAJW/bz5oUksEMqkeHtR3QjVnCOFX45w==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:05:00 np0005543225 certmonger[38530]: " Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:05:00 np0005543225 certmonger[38530]: MIIFWzCCA8OgAwIBAgIBRTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:00 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:00 np0005543225 certmonger[38530]: MDQ1OVoXDTI3MTIwNDA4MDQ1OVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:00 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:00 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBALEeFwD81eIdhWFd3en1DxfOZIZliHUOuClB Dec 3 08:05:00 np0005543225 certmonger[38530]: H25egMVv1WBVUZjAjoACroxuW/ew4RY80HJF7geng7IgXqd4GG9JQCDdZRs7Jcok Dec 3 08:05:00 np0005543225 certmonger[38530]: kxIHHBElcnlVRZYGX/Fu9XjdvYZJcibgU2W5VsxmA2Dl6p2I3mjvJZND/2enoYMX Dec 3 08:05:00 np0005543225 certmonger[38530]: uet4e70sIKdCEYsMWW5h6oucoPi9zOhB6HLTlRPF833OcWfCjvBUdQ2ZOwvD10Ox Dec 3 08:05:00 np0005543225 certmonger[38530]: eTuTjcVwQ1zkiqYpvUvwM56AodjX3ss9cXLGlaJRNMMTapHpU4DJEQEkdKg0B1Je Dec 3 08:05:00 np0005543225 certmonger[38530]: 2nrNDy5Ib7Wf6tTC+551kKzbkFyjYCIYZUABph3+PQOSx6E1gTsCAwEAAaOCAeww Dec 3 08:05:00 np0005543225 certmonger[38530]: ggHoMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:00 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:00 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:00 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:00 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:00 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEV4JiNoltftY1yuCQ2g2J8F Dec 3 08:05:00 np0005543225 certmonger[38530]: JayAMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:00 np0005543225 certmonger[38530]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NTQzMjI1LmludGVy Dec 3 08:05:00 np0005543225 certmonger[38530]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Dec 3 08:05:00 np0005543225 certmonger[38530]: U1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1NDMyMjUuaW50ZXJuYWxh Dec 3 08:05:00 np0005543225 certmonger[38530]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAANQDMiTSqGXUrRly65iFcPb Dec 3 08:05:00 np0005543225 certmonger[38530]: DTgX2nj+PQSK0q8RoL0FGRGBOGTSfJAb/fq/auOSdrX7ieNd9v/qkR6pp9rRDMby Dec 3 08:05:00 np0005543225 certmonger[38530]: 86TSbBsno48uuHWCDBEXDExb0j70r+hUMiw5/d6oQ8+GGdzwkN63U+TNKOW/eGA2 Dec 3 08:05:00 np0005543225 certmonger[38530]: ZhKMaA9hYKyLZkjjXzQrg8vI8HwVJijT0dFvgMOdu3tvuCTZN/322W+ZtLN+Ja2G Dec 3 08:05:00 np0005543225 certmonger[38530]: EfhK4kU1NrIMXRg86qEil5xeZSQSWIvc4H8OqVS41w9qmXZaR87NOu8Nvthyc+lS Dec 3 08:05:00 np0005543225 certmonger[38530]: khXU3BgwlizuziyzWUO4BmdMijHkaGn2tuRVRgzZJYqYFOmfGCZ8MkRMZnw0i7It Dec 3 08:05:00 np0005543225 certmonger[38530]: VcCUl0oCVga4577cJHzC4uKCR1x5k3WcZlcs8nq9lggoQVX707Jo9xE8OKUkNaRB Dec 3 08:05:00 np0005543225 certmonger[38530]: L813w7598Z/KaIkMBiq4ArXbbD8bwGlluSlKKxVzsQYRkqj8A4XwLzDV8DELV8O1 Dec 3 08:05:00 np0005543225 certmonger[38530]: eiyKFO1niaCAJW/bz5oUksEMqkeHtR3QjVnCOFX45w== Dec 3 08:05:00 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:05:00 np0005543225 certmonger[38530]: ". Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] No hooks set for pre-save command. Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] No hooks set for post-save command. Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 certmonger[42679]: Certificate in file "/etc/pki/tls/certs/ovn_dbs.crt" issued by CA and saved. Dec 3 08:05:00 np0005543225 certmonger[38530]: 2025-12-03 08:05:00 [38530] Wrote to /var/lib/certmonger/requests/20251203080459 Dec 3 08:05:00 np0005543225 python3[42695]: ansible-ansible.builtin.file Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig recurse=True state=directory selevel=s0 setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 08:05:01 np0005543225 python3[42711]: ansible-ansible.legacy.command Invoked with _raw_params=ovsdb-tool --help|grep -q election-timer _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:05:02 np0005543225 python3[42762]: ansible-ansible.legacy.stat Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 08:05:02 np0005543225 python3[42805]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764749101.6022062-111711-25499466322441/source dest=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster mode=640 selevel=s0 setype=container_file_t follow=False _original_basename=ovn_cluster.j2 checksum=9de557d4e92b17001042d27d7011fc7f41497a92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None attributes=None Dec 3 08:05:03 np0005543225 python3[42835]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_north_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:05:03 np0005543225 python3[42852]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_south_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:05:04 np0005543225 python3[42869]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_northd _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:05:04 np0005543225 python3[42886]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:05:05 np0005543225 python3[42906]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:05:08 np0005543225 python3[42923]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:05:11 np0005543225 python3[42940]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:05:12 np0005543225 python3[42956]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:05:12 np0005543225 python3[42972]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:05:13 np0005543225 python3[42990]: ansible-certificate_request Invoked with name=ovn_controller dns=['np0005543225.internalapi.ooo.test'] principal=['ovn_controller/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:13 np0005543225 certmonger[38530]: 2025-12-03 08:05:13 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:05:14 np0005543225 certmonger[43000]: " for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_controller/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:05:14 np0005543225 certmonger[43000]: " for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:05:14 np0005543225 certmonger[43000]: MIID5jCCAs4CAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:05:14 np0005543225 certmonger[43000]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAl6NJDzTR Dec 3 08:05:14 np0005543225 certmonger[43000]: diczD5s52J0gh346mSz4HLBk4fCsShpdTlEthoAON/jDpzIxfeqlnq9IqxK9SIm9 Dec 3 08:05:14 np0005543225 certmonger[43000]: UslpzcCwBV3c5kGV6jIrEMjhx4+gCZcZ5I+yBEQxxk8lIXlfdW59nYEiuY0i2o/q Dec 3 08:05:14 np0005543225 certmonger[43000]: 06gD6zVjv2zeGJJ5oPxjfpaH9cEG4fym92TGneNYAzrh9UnSmyolObkETyJtMrFp Dec 3 08:05:14 np0005543225 certmonger[43000]: AWUrh4wg29ObCbCAqDiGD6k5gNcUEPImO08Deli4isFMv8NEp/hTPKSLrQmoxoZL Dec 3 08:05:14 np0005543225 certmonger[43000]: 6iZOO4c3CydXPMrxvwuZJb4uwcKvUI95pBcYJUsp09Ld5APyUXGhOMpvWkT0eQO2 Dec 3 08:05:14 np0005543225 certmonger[43000]: niwcgxVM0dEG7QIDAQABoIIBczArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:05:14 np0005543225 certmonger[43000]: ADAAMwAwADgAMAA1ADEAMzCCAUIGCSqGSIb3DQEJDjGCATMwggEvMAsGA1UdDwQE Dec 3 08:05:14 np0005543225 certmonger[43000]: AwIFoDCB0wYDVR0RBIHLMIHIgiFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:05:14 np0005543225 certmonger[43000]: LnRlc3SgSQYKKwYBBAGCNxQCA6A7DDlvdm5fY29udHJvbGxlci9ucDAwMDU1NDMy Dec 3 08:05:14 np0005543225 certmonger[43000]: MjUuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgWAYGKwYBBQICoE4wTKAK Dec 3 08:05:14 np0005543225 certmonger[43000]: GwhPT08uVEVTVKE+MDygAwIBAaE1MDMbDm92bl9jb250cm9sbGVyGyFucDAwMDU1 Dec 3 08:05:14 np0005543225 certmonger[43000]: NDMyMjUuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEG Dec 3 08:05:14 np0005543225 certmonger[43000]: CCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFFT2HE8kZi6ActruxcB+ Dec 3 08:05:14 np0005543225 certmonger[43000]: Y7O/5rViMA0GCSqGSIb3DQEBCwUAA4IBAQCMH3owP+mz3Cg1qYuU8vFZMs6cNtGY Dec 3 08:05:14 np0005543225 certmonger[43000]: lrybieZ63CuwnQp+8XLMS/vMPdFhpCQdMHAM+FNcqeiZXFziHFp8X0UmHQ0uGQ42 Dec 3 08:05:14 np0005543225 certmonger[43000]: a6Fn6V3rC04ahL3HN88XlrBXfN1G7hm9lOeZi0TXXsKbcFOCT4JXWsUSlM4nuA2Q Dec 3 08:05:14 np0005543225 certmonger[43000]: 9A9AoRnMInONiBJytUwniF0MGdobRYXg7U5fXkMYht0p+BJOl5qVUja3KRj80Chl Dec 3 08:05:14 np0005543225 certmonger[43000]: vkQdIBd1dYkPJpvH4plKzQ7JvpEXtkv4v+HP4Uaq7AVj/9REvV9Iof/7lB1nZ604 Dec 3 08:05:14 np0005543225 certmonger[43000]: hAyhl0PnkNDI87DvTPIPN6zxoI+tkDUVwPKXtCSzC4NSbbgdmpjT8DPk Dec 3 08:05:14 np0005543225 certmonger[43000]: -----END CERTIFICATE REQUEST----- Dec 3 08:05:14 np0005543225 certmonger[43000]: " for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAl6NJDzTRdiczD5s52J0gh346mSz4HLBk4fCsShpdTlEthoAON/jDpzIxfeqlnq9IqxK9SIm9UslpzcCwBV3c5kGV6jIrEMjhx4+gCZcZ5I+yBEQxxk8lIXlfdW59nYEiuY0i2o/q06gD6zVjv2zeGJJ5oPxjfpaH9cEG4fym92TGneNYAzrh9UnSmyolObkETyJtMrFpAWUrh4wg29ObCbCAqDiGD6k5gNcUEPImO08Deli4isFMv8NEp/hTPKSLrQmoxoZL6iZOO4c3CydXPMrxvwuZJb4uwcKvUI95pBcYJUsp09Ld5APyUXGhOMpvWkT0eQO2niwcgxVM0dEG7QIDAQAB" for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:05:14 np0005543225 certmonger[43000]: 2025-12-03 08:05:14 [43000] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[43000]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:05:14 np0005543225 certmonger[43000]: Certificate: "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" Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Certificate submission still ongoing. Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Certificate submission attempt complete. Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Child status = 0. Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Child output: Dec 3 08:05:14 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:05:14 np0005543225 certmonger[38530]: MIIFaTCCA9GgAwIBAgIBRzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:14 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:14 np0005543225 certmonger[38530]: MDUxNFoXDTI3MTIwNDA4MDUxNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:14 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:14 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAJejSQ800XYnMw+bOdidIId+Opks+BywZOHw Dec 3 08:05:14 np0005543225 certmonger[38530]: rEoaXU5RLYaADjf4w6cyMX3qpZ6vSKsSvUiJvVLJac3AsAVd3OZBleoyKxDI4ceP Dec 3 08:05:14 np0005543225 certmonger[38530]: oAmXGeSPsgREMcZPJSF5X3VufZ2BIrmNItqP6tOoA+s1Y79s3hiSeaD8Y36Wh/XB Dec 3 08:05:14 np0005543225 certmonger[38530]: BuH8pvdkxp3jWAM64fVJ0psqJTm5BE8ibTKxaQFlK4eMINvTmwmwgKg4hg+pOYDX Dec 3 08:05:14 np0005543225 certmonger[38530]: FBDyJjtPA3pYuIrBTL/DRKf4Uzyki60JqMaGS+omTjuHNwsnVzzK8b8LmSW+LsHC Dec 3 08:05:14 np0005543225 certmonger[38530]: r1CPeaQXGCVLKdPS3eQD8lFxoTjKb1pE9HkDtp4sHIMVTNHRBu0CAwEAAaOCAfow Dec 3 08:05:14 np0005543225 certmonger[38530]: ggH2MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:14 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:14 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:14 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:14 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:14 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDOY/dWv82xpgul8i3kO82fe Dec 3 08:05:14 np0005543225 certmonger[38530]: 0qUVMIHTBgNVHREEgcswgciCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:14 np0005543225 certmonger[38530]: dGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTU0MzIy Dec 3 08:05:14 np0005543225 certmonger[38530]: NS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob Dec 3 08:05:14 np0005543225 certmonger[38530]: CE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTU0 Dec 3 08:05:14 np0005543225 certmonger[38530]: MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAR2xQ Dec 3 08:05:14 np0005543225 certmonger[38530]: MR3dcbeKOEocYZicNPX/QR1d/X30juKdEbC7OLVUeqwzCuWWWNUFLMvHiO8/GKro Dec 3 08:05:14 np0005543225 certmonger[38530]: CpKb9Pgn8GLhctwmzxLjuI3QTQ8thc9ny/TfTmdRE4zoQbfvE4q/U5xsyp8cZdur Dec 3 08:05:14 np0005543225 certmonger[38530]: XUZeTo2n1fQWTkdji0mO1Yvg3p/RQlPMkRuYligfUnTaStsrfOisgWnYpgt1+n2t Dec 3 08:05:14 np0005543225 certmonger[38530]: 6agTjvcqSG/DyZ/AF8MelOevOeqK3js0NDf9No0wXw8pdeznp/ZUpZmZqQ4N9a/3 Dec 3 08:05:14 np0005543225 certmonger[38530]: qMp1ajo+wViyYCoGqyabTNqRwKs23+zX376+oumV74wA5wtjEw0Aln6Bxu6R9fix Dec 3 08:05:14 np0005543225 certmonger[38530]: O+JfzOdGuIT68vkEZVUm3ytfY6rcvLE+G/NaZSAW0UXN/aoELaEYf8zBaUL0uKgD Dec 3 08:05:14 np0005543225 certmonger[38530]: KYg/28tpPEbGSgk2Pna0TqR7NmLVTKAGr47ji2srrO7yc+SQmStnuRSGJGBNf3yX Dec 3 08:05:14 np0005543225 certmonger[38530]: RrCXVTIyg1ZDPV6HGm/kCSnDm/SYu88RvgKe0g8XjEwXLPWLRLvYQQWJiveN Dec 3 08:05:14 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:05:14 np0005543225 certmonger[38530]: " Dec 3 08:05:14 np0005543225 certmonger[43002]: 2025-12-03 08:05:14 [43002] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:05:14 np0005543225 certmonger[43002]: MIIFaTCCA9GgAwIBAgIBRzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:14 np0005543225 certmonger[43002]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:14 np0005543225 certmonger[43002]: MDUxNFoXDTI3MTIwNDA4MDUxNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:14 np0005543225 certmonger[43002]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:14 np0005543225 certmonger[43002]: hvcNAQEBBQADggEPADCCAQoCggEBAJejSQ800XYnMw+bOdidIId+Opks+BywZOHw Dec 3 08:05:14 np0005543225 certmonger[43002]: rEoaXU5RLYaADjf4w6cyMX3qpZ6vSKsSvUiJvVLJac3AsAVd3OZBleoyKxDI4ceP Dec 3 08:05:14 np0005543225 certmonger[43002]: oAmXGeSPsgREMcZPJSF5X3VufZ2BIrmNItqP6tOoA+s1Y79s3hiSeaD8Y36Wh/XB Dec 3 08:05:14 np0005543225 certmonger[43002]: BuH8pvdkxp3jWAM64fVJ0psqJTm5BE8ibTKxaQFlK4eMINvTmwmwgKg4hg+pOYDX Dec 3 08:05:14 np0005543225 certmonger[43002]: FBDyJjtPA3pYuIrBTL/DRKf4Uzyki60JqMaGS+omTjuHNwsnVzzK8b8LmSW+LsHC Dec 3 08:05:14 np0005543225 certmonger[43002]: r1CPeaQXGCVLKdPS3eQD8lFxoTjKb1pE9HkDtp4sHIMVTNHRBu0CAwEAAaOCAfow Dec 3 08:05:14 np0005543225 certmonger[43002]: ggH2MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:14 np0005543225 certmonger[43002]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:14 np0005543225 certmonger[43002]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:14 np0005543225 certmonger[43002]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:14 np0005543225 certmonger[43002]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:14 np0005543225 certmonger[43002]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDOY/dWv82xpgul8i3kO82fe Dec 3 08:05:14 np0005543225 certmonger[43002]: 0qUVMIHTBgNVHREEgcswgciCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:14 np0005543225 certmonger[43002]: dGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTU0MzIy Dec 3 08:05:14 np0005543225 certmonger[43002]: NS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob Dec 3 08:05:14 np0005543225 certmonger[43002]: CE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTU0 Dec 3 08:05:14 np0005543225 certmonger[43002]: MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAR2xQ Dec 3 08:05:14 np0005543225 certmonger[43002]: MR3dcbeKOEocYZicNPX/QR1d/X30juKdEbC7OLVUeqwzCuWWWNUFLMvHiO8/GKro Dec 3 08:05:14 np0005543225 certmonger[43002]: CpKb9Pgn8GLhctwmzxLjuI3QTQ8thc9ny/TfTmdRE4zoQbfvE4q/U5xsyp8cZdur Dec 3 08:05:14 np0005543225 certmonger[43002]: XUZeTo2n1fQWTkdji0mO1Yvg3p/RQlPMkRuYligfUnTaStsrfOisgWnYpgt1+n2t Dec 3 08:05:14 np0005543225 certmonger[43002]: 6agTjvcqSG/DyZ/AF8MelOevOeqK3js0NDf9No0wXw8pdeznp/ZUpZmZqQ4N9a/3 Dec 3 08:05:14 np0005543225 certmonger[43002]: qMp1ajo+wViyYCoGqyabTNqRwKs23+zX376+oumV74wA5wtjEw0Aln6Bxu6R9fix Dec 3 08:05:14 np0005543225 certmonger[43002]: O+JfzOdGuIT68vkEZVUm3ytfY6rcvLE+G/NaZSAW0UXN/aoELaEYf8zBaUL0uKgD Dec 3 08:05:14 np0005543225 certmonger[43002]: KYg/28tpPEbGSgk2Pna0TqR7NmLVTKAGr47ji2srrO7yc+SQmStnuRSGJGBNf3yX Dec 3 08:05:14 np0005543225 certmonger[43002]: RrCXVTIyg1ZDPV6HGm/kCSnDm/SYu88RvgKe0g8XjEwXLPWLRLvYQQWJiveN Dec 3 08:05:14 np0005543225 certmonger[43002]: -----END CERTIFICATE----- Dec 3 08:05:14 np0005543225 certmonger[43002]: ". Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Certificate submission still ongoing. Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Certificate submission postprocessing complete. Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Child status = 0. Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Child output: Dec 3 08:05:14 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFaTCCA9GgAwIBAgIBRzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4\nMDUxNFoXDTI3MTIwNDA4MDUxNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBAJejSQ800XYnMw+bOdidIId+Opks+BywZOHw\nrEoaXU5RLYaADjf4w6cyMX3qpZ6vSKsSvUiJvVLJac3AsAVd3OZBleoyKxDI4ceP\noAmXGeSPsgREMcZPJSF5X3VufZ2BIrmNItqP6tOoA+s1Y79s3hiSeaD8Y36Wh/XB\nBuH8pvdkxp3jWAM64fVJ0psqJTm5BE8ibTKxaQFlK4eMINvTmwmwgKg4hg+pOYDX\nFBDyJjtPA3pYuIrBTL/DRKf4Uzyki60JqMaGS+omTjuHNwsnVzzK8b8LmSW+LsHC\nr1CPeaQXGCVLKdPS3eQD8lFxoTjKb1pE9HkDtp4sHIMVTNHRBu0CAwEAAaOCAfow\nggH2MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDOY/dWv82xpgul8i3kO82fe\n0qUVMIHTBgNVHREEgcswgciCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u\ndGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTU0MzIy\nNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob\nCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTU0\nMzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAR2xQ\nMR3dcbeKOEocYZicNPX/QR1d/X30juKdEbC7OLVUeqwzCuWWWNUFLMvHiO8/GKro\nCpKb9Pgn8GLhctwmzxLjuI3QTQ8thc9ny/TfTmdRE4zoQbfvE4q/U5xsyp8cZdur\nXUZeTo2n1fQWTkdji0mO1Yvg3p/RQlPMkRuYligfUnTaStsrfOisgWnYpgt1+n2t\n6agTjvcqSG/DyZ/AF8MelOevOeqK3js0NDf9No0wXw8pdeznp/ZUpZmZqQ4N9a/3\nqMp1ajo+wViyYCoGqyabTNqRwKs23+zX376+oumV74wA5wtjEw0Aln6Bxu6R9fix\nO+JfzOdGuIT68vkEZVUm3ytfY6rcvLE+G/NaZSAW0UXN/aoELaEYf8zBaUL0uKgD\nKYg/28tpPEbGSgk2Pna0TqR7NmLVTKAGr47ji2srrO7yc+SQmStnuRSGJGBNf3yX\nRrCXVTIyg1ZDPV6HGm/kCSnDm/SYu88RvgKe0g8XjEwXLPWLRLvYQQWJiveN\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:05:14 np0005543225 certmonger[38530]: " Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:05:14 np0005543225 certmonger[38530]: MIIFaTCCA9GgAwIBAgIBRzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:14 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:14 np0005543225 certmonger[38530]: MDUxNFoXDTI3MTIwNDA4MDUxNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:14 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:14 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAJejSQ800XYnMw+bOdidIId+Opks+BywZOHw Dec 3 08:05:14 np0005543225 certmonger[38530]: rEoaXU5RLYaADjf4w6cyMX3qpZ6vSKsSvUiJvVLJac3AsAVd3OZBleoyKxDI4ceP Dec 3 08:05:14 np0005543225 certmonger[38530]: oAmXGeSPsgREMcZPJSF5X3VufZ2BIrmNItqP6tOoA+s1Y79s3hiSeaD8Y36Wh/XB Dec 3 08:05:14 np0005543225 certmonger[38530]: BuH8pvdkxp3jWAM64fVJ0psqJTm5BE8ibTKxaQFlK4eMINvTmwmwgKg4hg+pOYDX Dec 3 08:05:14 np0005543225 certmonger[38530]: FBDyJjtPA3pYuIrBTL/DRKf4Uzyki60JqMaGS+omTjuHNwsnVzzK8b8LmSW+LsHC Dec 3 08:05:14 np0005543225 certmonger[38530]: r1CPeaQXGCVLKdPS3eQD8lFxoTjKb1pE9HkDtp4sHIMVTNHRBu0CAwEAAaOCAfow Dec 3 08:05:14 np0005543225 certmonger[38530]: ggH2MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:14 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:14 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:14 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:14 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:14 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDOY/dWv82xpgul8i3kO82fe Dec 3 08:05:14 np0005543225 certmonger[38530]: 0qUVMIHTBgNVHREEgcswgciCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:14 np0005543225 certmonger[38530]: dGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTU0MzIy Dec 3 08:05:14 np0005543225 certmonger[38530]: NS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob Dec 3 08:05:14 np0005543225 certmonger[38530]: CE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTU0 Dec 3 08:05:14 np0005543225 certmonger[38530]: MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAR2xQ Dec 3 08:05:14 np0005543225 certmonger[38530]: MR3dcbeKOEocYZicNPX/QR1d/X30juKdEbC7OLVUeqwzCuWWWNUFLMvHiO8/GKro Dec 3 08:05:14 np0005543225 certmonger[38530]: CpKb9Pgn8GLhctwmzxLjuI3QTQ8thc9ny/TfTmdRE4zoQbfvE4q/U5xsyp8cZdur Dec 3 08:05:14 np0005543225 certmonger[38530]: XUZeTo2n1fQWTkdji0mO1Yvg3p/RQlPMkRuYligfUnTaStsrfOisgWnYpgt1+n2t Dec 3 08:05:14 np0005543225 certmonger[38530]: 6agTjvcqSG/DyZ/AF8MelOevOeqK3js0NDf9No0wXw8pdeznp/ZUpZmZqQ4N9a/3 Dec 3 08:05:14 np0005543225 certmonger[38530]: qMp1ajo+wViyYCoGqyabTNqRwKs23+zX376+oumV74wA5wtjEw0Aln6Bxu6R9fix Dec 3 08:05:14 np0005543225 certmonger[38530]: O+JfzOdGuIT68vkEZVUm3ytfY6rcvLE+G/NaZSAW0UXN/aoELaEYf8zBaUL0uKgD Dec 3 08:05:14 np0005543225 certmonger[38530]: KYg/28tpPEbGSgk2Pna0TqR7NmLVTKAGr47ji2srrO7yc+SQmStnuRSGJGBNf3yX Dec 3 08:05:14 np0005543225 certmonger[38530]: RrCXVTIyg1ZDPV6HGm/kCSnDm/SYu88RvgKe0g8XjEwXLPWLRLvYQQWJiveN Dec 3 08:05:14 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:05:14 np0005543225 certmonger[38530]: ". Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] No hooks set for pre-save command. Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] No hooks set for post-save command. Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:14 np0005543225 certmonger[43006]: Certificate in file "/etc/pki/tls/certs/ovn_controller.crt" issued by CA and saved. Dec 3 08:05:14 np0005543225 certmonger[38530]: 2025-12-03 08:05:14 [38530] Wrote to /var/lib/certmonger/requests/20251203080513 Dec 3 08:05:15 np0005543225 python3[43022]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:05:16 np0005543225 python3[43042]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:05:19 np0005543225 python3[43059]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:05:22 np0005543225 python3[43076]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:05:22 np0005543225 python3[43092]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:05:23 np0005543225 python3[43108]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:05:23 np0005543225 python3[43126]: ansible-certificate_request Invoked with name=rabbitmq dns=['np0005543225.internalapi.ooo.test'] principal=['rabbitmq/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'rabbitmq(-bundle-.*-[0-9]+)?')#012service_crt="/etc/pki/tls/certs/rabbitmq.crt"#012service_key="/etc/pki/tls/private/rabbitmq.key"#012if echo "$container_name" | grep -q "^rabbitmq-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_crt" "$service_key" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the cert at the mount-point#012 podman cp $service_crt "$container_name:/var/lib/kolla/config_files/src-tls/$service_crt"#012 # Refresh the key at the mount-point#012 podman cp $service_key "$container_name:/var/lib/kolla/config_files/src-tls/$service_key"#012 # Copy the new cert from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012 # Copy the new key from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012fi#012# Set appropriate permissions#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_crt"#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_key"#012# Trigger a pem cache clear in RabbitMQ to read the new certificates#012podman exec "$container_name" rabbitmqctl eval "ssl:clear_pem_cache()."#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:05:24 np0005543225 certmonger[43136]: " for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_REQ_PRINCIPAL" to "rabbitmq/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:05:24 np0005543225 certmonger[43136]: " for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:05:24 np0005543225 certmonger[43136]: MIID2jCCAsICAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:05:24 np0005543225 certmonger[43136]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAq7aTcgok Dec 3 08:05:24 np0005543225 certmonger[43136]: sjvuJ8OrLvLwYXVLzrSnIyMeQv7eQ/2Ai2q12VKKtga09Mv1kLUPzIj9Cigu1zFe Dec 3 08:05:24 np0005543225 certmonger[43136]: B/FoSIq89xA34kDfYYqwo11qMBRMVNteLpUJf0q5FyS9LgcFs/1kY1bQz07+IAB6 Dec 3 08:05:24 np0005543225 certmonger[43136]: JYvqE9M50UloDY/EwDR1e8hZrn87OmX0bhO9aiQ/hRNf3+DQ8gyyCbJZsrJXU50G Dec 3 08:05:24 np0005543225 certmonger[43136]: yKEYMGQ4uYLDJHgfpCwBvDq7l+m18L19yjhEadrkOjjGp0hOsw+E2gO4X7p2tR6o Dec 3 08:05:24 np0005543225 certmonger[43136]: A5USCPmV6gJ6Nyw/3zV+IxOemBwoLDA/+TMyV6B98BbpAGn133/1fWmjMx90ppkr Dec 3 08:05:24 np0005543225 certmonger[43136]: gn+/dYbK1hHG/QIDAQABoIIBZzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:05:24 np0005543225 certmonger[43136]: ADAAMwAwADgAMAA1ADIANDCCATYGCSqGSIb3DQEJDjGCAScwggEjMAsGA1UdDwQE Dec 3 08:05:24 np0005543225 certmonger[43136]: AwIFoDCBxwYDVR0RBIG/MIG8giFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:05:24 np0005543225 certmonger[43136]: LnRlc3SgQwYKKwYBBAGCNxQCA6A1DDNyYWJiaXRtcS9ucDAwMDU1NDMyMjUuaW50 Dec 3 08:05:24 np0005543225 certmonger[43136]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUgYGKwYBBQICoEgwRqAKGwhPT08u Dec 3 08:05:24 np0005543225 certmonger[43136]: VEVTVKE4MDagAwIBAaEvMC0bCHJhYmJpdG1xGyFucDAwMDU1NDMyMjUuaW50ZXJu Dec 3 08:05:24 np0005543225 certmonger[43136]: YWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwG Dec 3 08:05:24 np0005543225 certmonger[43136]: A1UdEwEB/wQCMAAwHQYDVR0OBBYEFFT2HE8kZi6ActruxcB+Y7O/5rViMA0GCSqG Dec 3 08:05:24 np0005543225 certmonger[43136]: SIb3DQEBCwUAA4IBAQAZFmDc+9HLyZAf/tX/DUasgXeVYPFOGId+WLXUGBmN822T Dec 3 08:05:24 np0005543225 certmonger[43136]: exNQmT98cm6+SnYXYLt61mYr93wGE7uON1pRzXGWpeRg/Ff8BQmWEP7dMsgILEr9 Dec 3 08:05:24 np0005543225 certmonger[43136]: VKtsuo4X2jJTPNhXRuJxxzGpXj3pm0EQMRbFFX85gtJWrRynd6wMIbsL4NIPRwn/ Dec 3 08:05:24 np0005543225 certmonger[43136]: wsvP18cr1zDJD5AJZPsEslXhojbd34+W29GDQjDzhDK9aHSs1LM1w5fP2nPw59Lj Dec 3 08:05:24 np0005543225 certmonger[43136]: G0McOmXK96DVlHT2b4fdGWcZ7jo1tHsaWvaND9XWo1G6r7RDZxfUr8b9LwZEcgM6 Dec 3 08:05:24 np0005543225 certmonger[43136]: PGsZBXxoKajxiVEwSTXJYG+KyuZcOpFdLwjjKpuo Dec 3 08:05:24 np0005543225 certmonger[43136]: -----END CERTIFICATE REQUEST----- Dec 3 08:05:24 np0005543225 certmonger[43136]: " for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAq7aTcgoksjvuJ8OrLvLwYXVLzrSnIyMeQv7eQ/2Ai2q12VKKtga09Mv1kLUPzIj9Cigu1zFeB/FoSIq89xA34kDfYYqwo11qMBRMVNteLpUJf0q5FyS9LgcFs/1kY1bQz07+IAB6JYvqE9M50UloDY/EwDR1e8hZrn87OmX0bhO9aiQ/hRNf3+DQ8gyyCbJZsrJXU50GyKEYMGQ4uYLDJHgfpCwBvDq7l+m18L19yjhEadrkOjjGp0hOsw+E2gO4X7p2tR6oA5USCPmV6gJ6Nyw/3zV+IxOemBwoLDA/+TMyV6B98BbpAGn133/1fWmjMx90ppkrgn+/dYbK1hHG/QIDAQAB" for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:05:24 np0005543225 certmonger[43136]: 2025-12-03 08:05:24 [43136] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[43136]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:05:24 np0005543225 certmonger[43136]: Certificate: "MIIFXTCCA8WgAwIBAgIBSTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4MDUyNFoXDTI3MTIwNDA4MDUyNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKu2k3IKJLI77ifDqy7y8GF1S860pyMjHkL+3kP9gItqtdlSirYGtPTL9ZC1D8yI/QooLtcxXgfxaEiKvPcQN+JA32GKsKNdajAUTFTbXi6VCX9KuRckvS4HBbP9ZGNW0M9O/iAAeiWL6hPTOdFJaA2PxMA0dXvIWa5/Ozpl9G4TvWokP4UTX9/g0PIMsgmyWbKyV1OdBsihGDBkOLmCwyR4H6QsAbw6u5fptfC9fco4RGna5Do4xqdITrMPhNoDuF+6drUeqAOVEgj5leoCejcsP981fiMTnpgcKCwwP/kzMlegffAW6QBp9d9/9X1pozMfdKaZK4J/v3WGytYRxv0CAwEAAaOCAe4wggHqMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFpRNXGuCk7Xc4wLPYgexZ9zlY/kMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5URVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAgCXk/vzLFuYJ8C6oyT5091hCfevupXzsVNnWAQVDoaHcwK1/NFmENjB4aAxYyzMfIvPjRUOpXZkJvjKOEf8XS9kvrNM5WFraYb9xZsiEYc0pnILxOsovS5riHMcNuIXG9n50TWYrIytbkBkONacfLb3HmnXQxjprPVm5jizDpwLUjRVRDVQnUQ+jXiAtiXXP85Wxp5sZu8IX07pGcEZGqjFQBWo9vwQMp6Ea3N3jhPwVAVtjzLaCuWKtNa7TCurcqWDuscIAFlM0pQTErb460bTrOSfOLq/J0+WYUgOYdOItEpBLfoLw7SE4b+OuYVI5T+yLjojWoPRSPR9bqwhJ4p1Vxa+Sz1I5d5jcGrsv9VXjRX71DrK+DZifXMJVyiqYoCuhOwhPn22u/LfYkEEZmXHCJB8Ckbs546HC+ozjt0YSthPq3o2uil9ni8SLRyIVQo/S/WOAVmq0hR4J3Bo9bgCnOsB0mfp7Gcv6iyzxjgu+q9IcBJw1ESR2AB1g8TdK" Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Certificate submission still ongoing. Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Certificate submission attempt complete. Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Child status = 0. Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Child output: Dec 3 08:05:24 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:05:24 np0005543225 certmonger[38530]: MIIFXTCCA8WgAwIBAgIBSTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:24 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:24 np0005543225 certmonger[38530]: MDUyNFoXDTI3MTIwNDA4MDUyNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:24 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:24 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAKu2k3IKJLI77ifDqy7y8GF1S860pyMjHkL+ Dec 3 08:05:24 np0005543225 certmonger[38530]: 3kP9gItqtdlSirYGtPTL9ZC1D8yI/QooLtcxXgfxaEiKvPcQN+JA32GKsKNdajAU Dec 3 08:05:24 np0005543225 certmonger[38530]: TFTbXi6VCX9KuRckvS4HBbP9ZGNW0M9O/iAAeiWL6hPTOdFJaA2PxMA0dXvIWa5/ Dec 3 08:05:24 np0005543225 certmonger[38530]: Ozpl9G4TvWokP4UTX9/g0PIMsgmyWbKyV1OdBsihGDBkOLmCwyR4H6QsAbw6u5fp Dec 3 08:05:24 np0005543225 certmonger[38530]: tfC9fco4RGna5Do4xqdITrMPhNoDuF+6drUeqAOVEgj5leoCejcsP981fiMTnpgc Dec 3 08:05:24 np0005543225 certmonger[38530]: KCwwP/kzMlegffAW6QBp9d9/9X1pozMfdKaZK4J/v3WGytYRxv0CAwEAAaOCAe4w Dec 3 08:05:24 np0005543225 certmonger[38530]: ggHqMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:24 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:24 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:24 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:24 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:24 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFpRNXGuCk7Xc4wLPYgexZ9z Dec 3 08:05:24 np0005543225 certmonger[38530]: lY/kMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:24 np0005543225 certmonger[38530]: dGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTU0MzIyNS5pbnRl Dec 3 08:05:24 np0005543225 certmonger[38530]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5U Dec 3 08:05:24 np0005543225 certmonger[38530]: RVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTU0MzIyNS5pbnRlcm5h Dec 3 08:05:24 np0005543225 certmonger[38530]: bGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAgCXk/vzLFuYJ8C6oyT50 Dec 3 08:05:24 np0005543225 certmonger[38530]: 91hCfevupXzsVNnWAQVDoaHcwK1/NFmENjB4aAxYyzMfIvPjRUOpXZkJvjKOEf8X Dec 3 08:05:24 np0005543225 certmonger[38530]: S9kvrNM5WFraYb9xZsiEYc0pnILxOsovS5riHMcNuIXG9n50TWYrIytbkBkONacf Dec 3 08:05:24 np0005543225 certmonger[38530]: Lb3HmnXQxjprPVm5jizDpwLUjRVRDVQnUQ+jXiAtiXXP85Wxp5sZu8IX07pGcEZG Dec 3 08:05:24 np0005543225 certmonger[38530]: qjFQBWo9vwQMp6Ea3N3jhPwVAVtjzLaCuWKtNa7TCurcqWDuscIAFlM0pQTErb46 Dec 3 08:05:24 np0005543225 certmonger[38530]: 0bTrOSfOLq/J0+WYUgOYdOItEpBLfoLw7SE4b+OuYVI5T+yLjojWoPRSPR9bqwhJ Dec 3 08:05:24 np0005543225 certmonger[38530]: 4p1Vxa+Sz1I5d5jcGrsv9VXjRX71DrK+DZifXMJVyiqYoCuhOwhPn22u/LfYkEEZ Dec 3 08:05:24 np0005543225 certmonger[38530]: mXHCJB8Ckbs546HC+ozjt0YSthPq3o2uil9ni8SLRyIVQo/S/WOAVmq0hR4J3Bo9 Dec 3 08:05:24 np0005543225 certmonger[38530]: bgCnOsB0mfp7Gcv6iyzxjgu+q9IcBJw1ESR2AB1g8TdK Dec 3 08:05:24 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:05:24 np0005543225 certmonger[38530]: " Dec 3 08:05:24 np0005543225 certmonger[43138]: 2025-12-03 08:05:24 [43138] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:05:24 np0005543225 certmonger[43138]: MIIFXTCCA8WgAwIBAgIBSTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:24 np0005543225 certmonger[43138]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:24 np0005543225 certmonger[43138]: MDUyNFoXDTI3MTIwNDA4MDUyNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:24 np0005543225 certmonger[43138]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:24 np0005543225 certmonger[43138]: hvcNAQEBBQADggEPADCCAQoCggEBAKu2k3IKJLI77ifDqy7y8GF1S860pyMjHkL+ Dec 3 08:05:24 np0005543225 certmonger[43138]: 3kP9gItqtdlSirYGtPTL9ZC1D8yI/QooLtcxXgfxaEiKvPcQN+JA32GKsKNdajAU Dec 3 08:05:24 np0005543225 certmonger[43138]: TFTbXi6VCX9KuRckvS4HBbP9ZGNW0M9O/iAAeiWL6hPTOdFJaA2PxMA0dXvIWa5/ Dec 3 08:05:24 np0005543225 certmonger[43138]: Ozpl9G4TvWokP4UTX9/g0PIMsgmyWbKyV1OdBsihGDBkOLmCwyR4H6QsAbw6u5fp Dec 3 08:05:24 np0005543225 certmonger[43138]: tfC9fco4RGna5Do4xqdITrMPhNoDuF+6drUeqAOVEgj5leoCejcsP981fiMTnpgc Dec 3 08:05:24 np0005543225 certmonger[43138]: KCwwP/kzMlegffAW6QBp9d9/9X1pozMfdKaZK4J/v3WGytYRxv0CAwEAAaOCAe4w Dec 3 08:05:24 np0005543225 certmonger[43138]: ggHqMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:24 np0005543225 certmonger[43138]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:24 np0005543225 certmonger[43138]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:24 np0005543225 certmonger[43138]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:24 np0005543225 certmonger[43138]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:24 np0005543225 certmonger[43138]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFpRNXGuCk7Xc4wLPYgexZ9z Dec 3 08:05:24 np0005543225 certmonger[43138]: lY/kMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:24 np0005543225 certmonger[43138]: dGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTU0MzIyNS5pbnRl Dec 3 08:05:24 np0005543225 certmonger[43138]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5U Dec 3 08:05:24 np0005543225 certmonger[43138]: RVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTU0MzIyNS5pbnRlcm5h Dec 3 08:05:24 np0005543225 certmonger[43138]: bGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAgCXk/vzLFuYJ8C6oyT50 Dec 3 08:05:24 np0005543225 certmonger[43138]: 91hCfevupXzsVNnWAQVDoaHcwK1/NFmENjB4aAxYyzMfIvPjRUOpXZkJvjKOEf8X Dec 3 08:05:24 np0005543225 certmonger[43138]: S9kvrNM5WFraYb9xZsiEYc0pnILxOsovS5riHMcNuIXG9n50TWYrIytbkBkONacf Dec 3 08:05:24 np0005543225 certmonger[43138]: Lb3HmnXQxjprPVm5jizDpwLUjRVRDVQnUQ+jXiAtiXXP85Wxp5sZu8IX07pGcEZG Dec 3 08:05:24 np0005543225 certmonger[43138]: qjFQBWo9vwQMp6Ea3N3jhPwVAVtjzLaCuWKtNa7TCurcqWDuscIAFlM0pQTErb46 Dec 3 08:05:24 np0005543225 certmonger[43138]: 0bTrOSfOLq/J0+WYUgOYdOItEpBLfoLw7SE4b+OuYVI5T+yLjojWoPRSPR9bqwhJ Dec 3 08:05:24 np0005543225 certmonger[43138]: 4p1Vxa+Sz1I5d5jcGrsv9VXjRX71DrK+DZifXMJVyiqYoCuhOwhPn22u/LfYkEEZ Dec 3 08:05:24 np0005543225 certmonger[43138]: mXHCJB8Ckbs546HC+ozjt0YSthPq3o2uil9ni8SLRyIVQo/S/WOAVmq0hR4J3Bo9 Dec 3 08:05:24 np0005543225 certmonger[43138]: bgCnOsB0mfp7Gcv6iyzxjgu+q9IcBJw1ESR2AB1g8TdK Dec 3 08:05:24 np0005543225 certmonger[43138]: -----END CERTIFICATE----- Dec 3 08:05:24 np0005543225 certmonger[43138]: ". Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Certificate submission still ongoing. Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Certificate submission postprocessing complete. Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Child status = 0. Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Child output: Dec 3 08:05:24 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nbgCnOsB0mfp7Gcv6iyzxjgu+q9IcBJw1ESR2AB1g8TdK\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:05:24 np0005543225 certmonger[38530]: " Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:05:24 np0005543225 certmonger[38530]: MIIFXTCCA8WgAwIBAgIBSTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:24 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:24 np0005543225 certmonger[38530]: MDUyNFoXDTI3MTIwNDA4MDUyNFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:24 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:24 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAKu2k3IKJLI77ifDqy7y8GF1S860pyMjHkL+ Dec 3 08:05:24 np0005543225 certmonger[38530]: 3kP9gItqtdlSirYGtPTL9ZC1D8yI/QooLtcxXgfxaEiKvPcQN+JA32GKsKNdajAU Dec 3 08:05:24 np0005543225 certmonger[38530]: TFTbXi6VCX9KuRckvS4HBbP9ZGNW0M9O/iAAeiWL6hPTOdFJaA2PxMA0dXvIWa5/ Dec 3 08:05:24 np0005543225 certmonger[38530]: Ozpl9G4TvWokP4UTX9/g0PIMsgmyWbKyV1OdBsihGDBkOLmCwyR4H6QsAbw6u5fp Dec 3 08:05:24 np0005543225 certmonger[38530]: tfC9fco4RGna5Do4xqdITrMPhNoDuF+6drUeqAOVEgj5leoCejcsP981fiMTnpgc Dec 3 08:05:24 np0005543225 certmonger[38530]: KCwwP/kzMlegffAW6QBp9d9/9X1pozMfdKaZK4J/v3WGytYRxv0CAwEAAaOCAe4w Dec 3 08:05:24 np0005543225 certmonger[38530]: ggHqMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:24 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:24 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:24 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:24 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:24 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFpRNXGuCk7Xc4wLPYgexZ9z Dec 3 08:05:24 np0005543225 certmonger[38530]: lY/kMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:24 np0005543225 certmonger[38530]: dGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTU0MzIyNS5pbnRl Dec 3 08:05:24 np0005543225 certmonger[38530]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5U Dec 3 08:05:24 np0005543225 certmonger[38530]: RVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTU0MzIyNS5pbnRlcm5h Dec 3 08:05:24 np0005543225 certmonger[38530]: bGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAgCXk/vzLFuYJ8C6oyT50 Dec 3 08:05:24 np0005543225 certmonger[38530]: 91hCfevupXzsVNnWAQVDoaHcwK1/NFmENjB4aAxYyzMfIvPjRUOpXZkJvjKOEf8X Dec 3 08:05:24 np0005543225 certmonger[38530]: S9kvrNM5WFraYb9xZsiEYc0pnILxOsovS5riHMcNuIXG9n50TWYrIytbkBkONacf Dec 3 08:05:24 np0005543225 certmonger[38530]: Lb3HmnXQxjprPVm5jizDpwLUjRVRDVQnUQ+jXiAtiXXP85Wxp5sZu8IX07pGcEZG Dec 3 08:05:24 np0005543225 certmonger[38530]: qjFQBWo9vwQMp6Ea3N3jhPwVAVtjzLaCuWKtNa7TCurcqWDuscIAFlM0pQTErb46 Dec 3 08:05:24 np0005543225 certmonger[38530]: 0bTrOSfOLq/J0+WYUgOYdOItEpBLfoLw7SE4b+OuYVI5T+yLjojWoPRSPR9bqwhJ Dec 3 08:05:24 np0005543225 certmonger[38530]: 4p1Vxa+Sz1I5d5jcGrsv9VXjRX71DrK+DZifXMJVyiqYoCuhOwhPn22u/LfYkEEZ Dec 3 08:05:24 np0005543225 certmonger[38530]: mXHCJB8Ckbs546HC+ozjt0YSthPq3o2uil9ni8SLRyIVQo/S/WOAVmq0hR4J3Bo9 Dec 3 08:05:24 np0005543225 certmonger[38530]: bgCnOsB0mfp7Gcv6iyzxjgu+q9IcBJw1ESR2AB1g8TdK Dec 3 08:05:24 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:05:24 np0005543225 certmonger[38530]: ". Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] No hooks set for pre-save command. Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 certmonger[38530]: 2025-12-03 08:05:24 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:24 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:25 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:25 np0005543225 certmonger[38530]: 2025-12-03 08:05:25 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:25 np0005543225 certmonger[38530]: 2025-12-03 08:05:25 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:25 np0005543225 certmonger[43237]: Certificate in file "/etc/pki/tls/certs/rabbitmq.crt" issued by CA and saved. Dec 3 08:05:25 np0005543225 certmonger[38530]: 2025-12-03 08:05:25 [38530] Wrote to /var/lib/certmonger/requests/20251203080524 Dec 3 08:05:25 np0005543225 python3[43253]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:05:25 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:31 np0005543225 podman[43254]: 2025-12-03 08:05:26.007737769 +0000 UTC m=+0.042366841 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 08:05:31 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:32 np0005543225 python3[43320]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 cluster.common.tag/rabbitmq:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:05:32 np0005543225 podman[43321]: 2025-12-03 08:05:32.239857089 +0000 UTC m=+0.045485849 image tag cf4ab8456a3abe57a7f04fa72c2968e2d1110502686fa60ebe007d8aced3db7d cluster.common.tag/rabbitmq:pcmklatest Dec 3 08:05:32 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:32 np0005543225 python3[43347]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:32 np0005543225 python3[43347]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 --format json Dec 3 08:05:32 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:32 np0005543225 python3[43347]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 -q --tls-verify=false Dec 3 08:05:36 np0005543225 podman[43359]: 2025-12-03 08:05:32.877100742 +0000 UTC m=+0.034785848 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 Dec 3 08:05:36 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:36 np0005543225 python3[43347]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a616d7a557ed72e2cb3c2f707314a11eec1313a010753921e54a824d721f2301 --format json Dec 3 08:05:36 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:36 np0005543225 python3[43447]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:36 np0005543225 python3[43447]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 --format json Dec 3 08:05:36 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:36 np0005543225 python3[43447]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 -q --tls-verify=false Dec 3 08:05:41 np0005543225 podman[43459]: 2025-12-03 08:05:36.806340193 +0000 UTC m=+0.042495016 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 Dec 3 08:05:41 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:41 np0005543225 python3[43447]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7ad54cee06bf23c7a73c6382f7e21cdf8ca093b59b1eba9d085eff95472a36e6 --format json Dec 3 08:05:41 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:42 np0005543225 python3[43537]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:42 np0005543225 python3[43537]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 --format json Dec 3 08:05:42 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:42 np0005543225 python3[43537]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 -q --tls-verify=false Dec 3 08:05:44 np0005543225 podman[43550]: 2025-12-03 08:05:42.424460167 +0000 UTC m=+0.044241266 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 Dec 3 08:05:44 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:44 np0005543225 python3[43537]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8ece98bf1089a0d3fdab5c6a92a2dd64fc4b0f8b7a05f2bfebd5d06b0149991f --format json Dec 3 08:05:44 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:44 np0005543225 python3[43627]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:44 np0005543225 python3[43627]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 --format json Dec 3 08:05:44 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:44 np0005543225 python3[43627]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 -q --tls-verify=false Dec 3 08:05:47 np0005543225 podman[43639]: 2025-12-03 08:05:44.893651272 +0000 UTC m=+0.044972796 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 08:05:47 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:47 np0005543225 python3[43627]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8bd08f386db64f8894158012c608a496eb287cf99090b41e503a9bc591b481e6 --format json Dec 3 08:05:47 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:47 np0005543225 python3[43717]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:47 np0005543225 python3[43717]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 --format json Dec 3 08:05:47 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:47 np0005543225 python3[43717]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 -q --tls-verify=false Dec 3 08:05:49 np0005543225 podman[43729]: 2025-12-03 08:05:47.572903432 +0000 UTC m=+0.042634566 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 08:05:49 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:49 np0005543225 python3[43717]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect bac901955dcf7a32a493c6ef724c092009bbc18467858aa8c55e916b8c2b2b8f --format json Dec 3 08:05:49 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:49 np0005543225 python3[43808]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:49 np0005543225 python3[43808]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 --format json Dec 3 08:05:49 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:49 np0005543225 python3[43808]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 -q --tls-verify=false Dec 3 08:05:51 np0005543225 podman[43820]: 2025-12-03 08:05:49.998983349 +0000 UTC m=+0.041969169 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 08:05:51 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:51 np0005543225 python3[43808]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b13c44df76d5b3bb87652b20507cc40d62568630b0249319c13c07bbb18c36c3 --format json Dec 3 08:05:51 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:52 np0005543225 python3[43884]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:52 np0005543225 python3[43884]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 --format json Dec 3 08:05:52 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:52 np0005543225 python3[43884]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 -q --tls-verify=false Dec 3 08:05:53 np0005543225 podman[43898]: 2025-12-03 08:05:52.17291154 +0000 UTC m=+0.033769272 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 08:05:53 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:53 np0005543225 python3[43884]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect cf4ab8456a3abe57a7f04fa72c2968e2d1110502686fa60ebe007d8aced3db7d --format json Dec 3 08:05:53 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:53 np0005543225 python3[43963]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:53 np0005543225 python3[43963]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 --format json Dec 3 08:05:53 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:53 np0005543225 python3[43963]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 -q --tls-verify=false Dec 3 08:05:58 np0005543225 podman[43975]: 2025-12-03 08:05:53.847199556 +0000 UTC m=+0.047458617 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 08:05:58 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:58 np0005543225 python3[43963]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b9d7c6447d3e11e4b7bc4c1a8872a5471a9020b0347f9e0a44060d9b2823bfe3 --format json Dec 3 08:05:58 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:58 np0005543225 python3[44054]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:58 np0005543225 python3[44054]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 --format json Dec 3 08:05:58 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:58 np0005543225 python3[44054]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 -q --tls-verify=false Dec 3 08:06:02 np0005543225 podman[44066]: 2025-12-03 08:05:58.723258813 +0000 UTC m=+0.042972234 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Dec 3 08:06:02 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:02 np0005543225 python3[44054]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 0b85a6c916779a2364dabc601af2849008f8a7bb090497d470f183826d209742 --format json Dec 3 08:06:02 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:02 np0005543225 python3[44145]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:02 np0005543225 python3[44145]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 --format json Dec 3 08:06:02 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:02 np0005543225 python3[44145]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 -q --tls-verify=false Dec 3 08:06:04 np0005543225 podman[44159]: 2025-12-03 08:06:02.657058848 +0000 UTC m=+0.040354518 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 Dec 3 08:06:04 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:04 np0005543225 python3[44145]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8bb56ea60f206582ac0e8abc44419c975a910cdb0dffbce91bd34eb53d7f0cc0 --format json Dec 3 08:06:04 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:04 np0005543225 python3[44412]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:04 np0005543225 python3[44412]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 --format json Dec 3 08:06:05 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:05 np0005543225 python3[44412]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 -q --tls-verify=false Dec 3 08:06:14 np0005543225 podman[44424]: 2025-12-03 08:06:05.074149099 +0000 UTC m=+0.043253181 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 08:06:14 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:14 np0005543225 python3[44412]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 2d473f0d6d0f3d389f26cf8e584cb2217e1a9f089f6623537c64c4ebe593ba39 --format json Dec 3 08:06:14 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:14 np0005543225 python3[44525]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:14 np0005543225 python3[44525]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 --format json Dec 3 08:06:15 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:15 np0005543225 python3[44525]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 -q --tls-verify=false Dec 3 08:06:21 np0005543225 podman[44552]: 2025-12-03 08:06:15.10306028 +0000 UTC m=+0.046934474 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Dec 3 08:06:21 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:21 np0005543225 python3[44525]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 59c0f32bbd0d880fb7671f77c7f9fe7eba6371b76ea661a3802be79175c9cf97 --format json Dec 3 08:06:21 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:21 np0005543225 python3[44730]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:21 np0005543225 python3[44730]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 --format json Dec 3 08:06:21 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:21 np0005543225 python3[44730]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 -q --tls-verify=false Dec 3 08:06:29 np0005543225 podman[44743]: 2025-12-03 08:06:22.00351789 +0000 UTC m=+0.049163861 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Dec 3 08:06:29 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:29 np0005543225 python3[44730]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d33cd7cbe30b5f4b1aaa37c443e1d6a0ab7f5cf2aaa69525a32fda95900b6c10 --format json Dec 3 08:06:29 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:29 np0005543225 python3[44822]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:29 np0005543225 python3[44822]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 --format json Dec 3 08:06:29 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:29 np0005543225 python3[44822]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 -q --tls-verify=false Dec 3 08:06:33 np0005543225 sshd[44904]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:06:34 np0005543225 podman[44834]: 2025-12-03 08:06:29.84896186 +0000 UTC m=+0.041612710 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Dec 3 08:06:34 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:34 np0005543225 python3[44822]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 431c4154374af6b6d532165560f80c367b832346d0d836548da79db297917d4e --format json Dec 3 08:06:34 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:34 np0005543225 python3[44933]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:34 np0005543225 python3[44933]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 --format json Dec 3 08:06:34 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:34 np0005543225 python3[44933]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 -q --tls-verify=false Dec 3 08:06:37 np0005543225 podman[44947]: 2025-12-03 08:06:34.847840453 +0000 UTC m=+0.046729649 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Dec 3 08:06:37 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:37 np0005543225 python3[44933]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d91d671d486b16c1c793bf9221f9d0576c18fc58940981d37833abeb53fd5301 --format json Dec 3 08:06:37 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:38 np0005543225 python3[45025]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:38 np0005543225 python3[45025]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 --format json Dec 3 08:06:38 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:38 np0005543225 python3[45025]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 -q --tls-verify=false Dec 3 08:06:48 np0005543225 podman[45038]: 2025-12-03 08:06:38.285280535 +0000 UTC m=+0.030825638 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Dec 3 08:06:48 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:48 np0005543225 python3[45025]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a579d4fdbda482f87d090081f6e846234e7904d62181a063e2d9b35577177b9f --format json Dec 3 08:06:48 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:49 np0005543225 python3[45130]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:49 np0005543225 python3[45130]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 --format json Dec 3 08:06:49 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:49 np0005543225 python3[45130]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 -q --tls-verify=false Dec 3 08:06:59 np0005543225 podman[45144]: 2025-12-03 08:06:49.371502776 +0000 UTC m=+0.044427331 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 08:06:59 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:59 np0005543225 python3[45130]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ea72abdd68f9a2d0af97778644413f0df0dab9d453b865185a199c5c12f4e55d --format json Dec 3 08:07:00 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:00 np0005543225 python3[45545]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:00 np0005543225 python3[45545]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 --format json Dec 3 08:07:00 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:00 np0005543225 python3[45545]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 -q --tls-verify=false Dec 3 08:07:02 np0005543225 podman[45558]: 2025-12-03 08:07:00.578645383 +0000 UTC m=+0.047070710 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Dec 3 08:07:02 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:02 np0005543225 python3[45545]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 835b9fac535c710ebcd7589f0ff14498479122b0c8b5628384d8a3491dd522b8 --format json Dec 3 08:07:03 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:03 np0005543225 python3[45636]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:03 np0005543225 python3[45636]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 --format json Dec 3 08:07:03 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:03 np0005543225 python3[45636]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 -q --tls-verify=false Dec 3 08:07:06 np0005543225 podman[45649]: 2025-12-03 08:07:03.483085259 +0000 UTC m=+0.043424983 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Dec 3 08:07:06 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:06 np0005543225 python3[45636]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ff1f91308b6fbe9092c5f1e2edb9f228bf32084b8df80485aea656b2849547d7 --format json Dec 3 08:07:07 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:07 np0005543225 python3[45729]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:07 np0005543225 python3[45729]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 --format json Dec 3 08:07:07 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:07 np0005543225 python3[45729]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 -q --tls-verify=false Dec 3 08:07:11 np0005543225 podman[45741]: 2025-12-03 08:07:07.51552038 +0000 UTC m=+0.046809253 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 Dec 3 08:07:11 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:11 np0005543225 python3[45729]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 93ea0c0505cfd89e3e321f4bacb12a17fef6f01eb6141df9dbcc45821d42917f --format json Dec 3 08:07:11 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:12 np0005543225 python3[45830]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:12 np0005543225 python3[45830]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 --format json Dec 3 08:07:12 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:12 np0005543225 python3[45830]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 -q --tls-verify=false Dec 3 08:07:13 np0005543225 podman[45842]: 2025-12-03 08:07:12.225271719 +0000 UTC m=+0.038670479 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Dec 3 08:07:13 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:13 np0005543225 python3[45830]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 01162f309a727f9f16ef893d348a6167be101f9c31f2a9a381f4a430ffc3b21a --format json Dec 3 08:07:13 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:13 np0005543225 python3[45909]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:13 np0005543225 python3[45909]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 --format json Dec 3 08:07:13 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:13 np0005543225 python3[45909]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 -q --tls-verify=false Dec 3 08:07:15 np0005543225 podman[45921]: 2025-12-03 08:07:14.05024032 +0000 UTC m=+0.048615371 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Dec 3 08:07:15 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:15 np0005543225 python3[45909]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ccd22ddeb69c8f3a05d2d3f97d21f9fa64c6f2bc3a156f93212de7feacea314f --format json Dec 3 08:07:15 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:15 np0005543225 python3[46074]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:15 np0005543225 python3[46074]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 --format json Dec 3 08:07:16 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:16 np0005543225 python3[46074]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 -q --tls-verify=false Dec 3 08:07:20 np0005543225 podman[46086]: 2025-12-03 08:07:16.078002239 +0000 UTC m=+0.049620107 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Dec 3 08:07:20 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:20 np0005543225 python3[46074]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 24976907b2c2553304119aba5731a800204d664feed24ca9eb7f2b4c7d81016b --format json Dec 3 08:07:20 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:21 np0005543225 python3[46165]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:21 np0005543225 python3[46165]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 --format json Dec 3 08:07:21 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:21 np0005543225 python3[46165]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 -q --tls-verify=false Dec 3 08:07:23 np0005543225 podman[46241]: 2025-12-03 08:07:21.151449733 +0000 UTC m=+0.049093163 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Dec 3 08:07:23 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:23 np0005543225 python3[46165]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 57163a7b21fdbb804a27897cb6e6052a5e5c7a339c45d663e80b52375a760dcf --format json Dec 3 08:07:23 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:23 np0005543225 python3[46320]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:23 np0005543225 python3[46320]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 --format json Dec 3 08:07:23 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:23 np0005543225 python3[46320]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 -q --tls-verify=false Dec 3 08:07:25 np0005543225 podman[46333]: 2025-12-03 08:07:23.896822022 +0000 UTC m=+0.045712864 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Dec 3 08:07:25 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:25 np0005543225 python3[46320]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b9682dee21d7c5836da0f5094cc87a67e8c855fb08692e50824e31ad6f3d7b7f --format json Dec 3 08:07:25 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:25 np0005543225 python3[46399]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:25 np0005543225 python3[46399]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 --format json Dec 3 08:07:25 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:25 np0005543225 python3[46399]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 -q --tls-verify=false Dec 3 08:07:27 np0005543225 podman[46411]: 2025-12-03 08:07:25.799418587 +0000 UTC m=+0.048222282 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Dec 3 08:07:27 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:27 np0005543225 python3[46399]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 076d82a27d63c8328729ed27ceb4291585ae18d017befe6fe353df7aa11715ae --format json Dec 3 08:07:28 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:28 np0005543225 python3[46489]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:28 np0005543225 python3[46489]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 --format json Dec 3 08:07:28 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:28 np0005543225 python3[46489]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 -q --tls-verify=false Dec 3 08:07:33 np0005543225 podman[46502]: 2025-12-03 08:07:28.521233045 +0000 UTC m=+0.047176413 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 08:07:33 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:33 np0005543225 python3[46489]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a2405b5037b4ecda355ba679b0452a03af79396a3962d913c65d6e971ae04ad9 --format json Dec 3 08:07:33 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:34 np0005543225 python3[46592]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:34 np0005543225 python3[46592]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 --format json Dec 3 08:07:34 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:34 np0005543225 python3[46592]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 -q --tls-verify=false Dec 3 08:07:36 np0005543225 podman[46605]: 2025-12-03 08:07:34.404236428 +0000 UTC m=+0.045954430 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Dec 3 08:07:36 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:36 np0005543225 python3[46592]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d9a3b5ac0adeeb65fb1be6ff5d0045b0f5c343dcfec19ba43a878e23890d2b6e --format json Dec 3 08:07:36 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:36 np0005543225 python3[46684]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:36 np0005543225 python3[46684]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 --format json Dec 3 08:07:36 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:36 np0005543225 python3[46684]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 -q --tls-verify=false Dec 3 08:07:39 np0005543225 podman[46696]: 2025-12-03 08:07:36.894322148 +0000 UTC m=+0.045253502 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Dec 3 08:07:39 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:39 np0005543225 python3[46684]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 9bc6fb316da179dd124d351484d6f1112e635a607defab7b2cc5463bbb6bf086 --format json Dec 3 08:07:39 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:40 np0005543225 python3[46773]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:40 np0005543225 python3[46773]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 --format json Dec 3 08:07:40 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:40 np0005543225 python3[46773]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 -q --tls-verify=false Dec 3 08:07:42 np0005543225 podman[46786]: 2025-12-03 08:07:40.136606207 +0000 UTC m=+0.043964158 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Dec 3 08:07:42 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:42 np0005543225 python3[46773]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e6e981540e553415b2d6eda490d7683db07164af2e7a0af8245623900338a4d6 --format json Dec 3 08:07:42 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:43 np0005543225 python3[46865]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:43 np0005543225 python3[46865]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 --format json Dec 3 08:07:43 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:43 np0005543225 python3[46865]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 -q --tls-verify=false Dec 3 08:07:45 np0005543225 podman[46877]: 2025-12-03 08:07:43.518603886 +0000 UTC m=+0.049938566 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 08:07:45 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:45 np0005543225 python3[46865]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 5710c4c9977d2ec6efe2229a91f94fd5ac38b06ccb63c09ee3ce15dd3c2f8756 --format json Dec 3 08:07:46 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:46 np0005543225 python3[46954]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:46 np0005543225 python3[46954]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 --format json Dec 3 08:07:46 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:46 np0005543225 python3[46954]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 -q --tls-verify=false Dec 3 08:07:48 np0005543225 podman[46966]: 2025-12-03 08:07:46.530837229 +0000 UTC m=+0.045817426 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Dec 3 08:07:48 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:48 np0005543225 python3[46954]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ede96ea916c936d09aefbff926e4cdbe1be4aeb7a9a1581064259698ac9d6d38 --format json Dec 3 08:07:48 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:49 np0005543225 python3[47045]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:49 np0005543225 python3[47045]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 --format json Dec 3 08:07:49 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:49 np0005543225 python3[47045]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 -q --tls-verify=false Dec 3 08:07:51 np0005543225 podman[47057]: 2025-12-03 08:07:49.29554373 +0000 UTC m=+0.045267166 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Dec 3 08:07:51 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:51 np0005543225 python3[47045]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 87ee88cbf01fb42e0b22747072843bcca6130a90eda4de6e74b3ccd847bb4040 --format json Dec 3 08:07:51 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:51 np0005543225 python3[47134]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:51 np0005543225 python3[47134]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 --format json Dec 3 08:07:51 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:51 np0005543225 python3[47134]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 -q --tls-verify=false Dec 3 08:07:53 np0005543225 podman[47146]: 2025-12-03 08:07:51.583579922 +0000 UTC m=+0.045150553 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 Dec 3 08:07:53 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:53 np0005543225 python3[47134]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d51fd7ce5400a7c4800bb82d80a52f917f3accf6aa602b7c20c427b481ad1e6b --format json Dec 3 08:07:53 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:54 np0005543225 python3[47223]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:54 np0005543225 python3[47223]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 --format json Dec 3 08:07:54 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:54 np0005543225 python3[47223]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 -q --tls-verify=false Dec 3 08:07:57 np0005543225 podman[47236]: 2025-12-03 08:07:54.571967408 +0000 UTC m=+0.053444173 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 Dec 3 08:07:57 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:57 np0005543225 python3[47223]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 6888a3a7246be9d1931c9a82c3e6b98c4ec30e2e363b80647ef78110ef87f229 --format json Dec 3 08:07:57 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:57 np0005543225 python3[47312]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:57 np0005543225 python3[47312]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 --format json Dec 3 08:07:58 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:58 np0005543225 python3[47312]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 -q --tls-verify=false Dec 3 08:08:00 np0005543225 podman[47324]: 2025-12-03 08:07:58.069463522 +0000 UTC m=+0.048717073 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 Dec 3 08:08:00 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:00 np0005543225 python3[47312]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect bca5bfd4d7b21ee858ad76cbe422ed1ea846fc4024ae502e9ed52eba39883d76 --format json Dec 3 08:08:00 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:01 np0005543225 python3[47402]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:08:01 np0005543225 python3[47402]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 --format json Dec 3 08:08:01 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:01 np0005543225 python3[47402]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 -q --tls-verify=false Dec 3 08:08:03 np0005543225 podman[47415]: 2025-12-03 08:08:01.500118355 +0000 UTC m=+0.052712204 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Dec 3 08:08:03 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:03 np0005543225 python3[47402]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 4d6ea8e2ec83f47f1713b4a93aa453a808e455a73bda48fb8ecdf020c5ccd5cb --format json Dec 3 08:08:03 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:03 np0005543225 python3[47490]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:08:03 np0005543225 python3[47490]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 --format json Dec 3 08:08:04 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:04 np0005543225 python3[47490]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 -q --tls-verify=false Dec 3 08:08:06 np0005543225 podman[47503]: 2025-12-03 08:08:04.115466916 +0000 UTC m=+0.043894632 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Dec 3 08:08:06 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:06 np0005543225 python3[47490]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7c77ef06363cc542abd59edc23ca348c84dc9f8a4ac2248a34728abb4e15057d --format json Dec 3 08:08:06 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:07 np0005543225 python3[47582]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:08:08 np0005543225 python3[47602]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:08:11 np0005543225 python3[47619]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:08:15 np0005543225 python3[47636]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:08:15 np0005543225 python3[47652]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:08:16 np0005543225 python3[47668]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:08:16 np0005543225 python3[47686]: ansible-certificate_request Invoked with name=redis dns=['np0005543225.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['redis/np0005543225.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep redis_tls_proxy)#012service_crt="/etc/pki/tls/certs/redis.crt"#012service_key="/etc/pki/tls/private/redis.key"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown memcached:memcached "$service_crt"#012podman exec "$container_name" chown memcached:memcached "$service_key"#012# Trigger a reload for stunnel to read the new certificate#012podman exec pkill -o -HUP stunnel#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543225.internalapi.ooo.test" for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543225.internalapi.ooo.test Dec 3 08:08:17 np0005543225 certmonger[47696]: overcloud.internalapi.ooo.test Dec 3 08:08:17 np0005543225 certmonger[47696]: " for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_REQ_PRINCIPAL" to "redis/np0005543225.internalapi.ooo.test@OOO.TEST Dec 3 08:08:17 np0005543225 certmonger[47696]: " for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:08:17 np0005543225 certmonger[47696]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI1LmludGVybmFsYXBp Dec 3 08:08:17 np0005543225 certmonger[47696]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAjcqdpjtC Dec 3 08:08:17 np0005543225 certmonger[47696]: Of1aLGIankbw1cKL/yngO3S858VeZxJ7bIqNY8D4/5KuCF/XSU+N1Tqkay/F8bV+ Dec 3 08:08:17 np0005543225 certmonger[47696]: YCjVv0pWpUHgFVvnojNfbgAEJpu8YvERGmezvuRVpdDSiCHGQbT9dMaiLLGFIUtT Dec 3 08:08:17 np0005543225 certmonger[47696]: OkvIKi9fgxQ9mXx8dq7T4zGlysb6AC0/o4rTUPzOdDXnpZlccxI5db87rP6Z43YX Dec 3 08:08:17 np0005543225 certmonger[47696]: uTgb5dYGXMei4aG4pBkUGxvIa1n0hSc8PC8pv6owVZT/6MusQqwLggUm5KmwHCu5 Dec 3 08:08:17 np0005543225 certmonger[47696]: ooAhdRVmD/35k5m0E2IjcYAQUBPVsOrO5yWC5OmJzkRIjqIGbxOpQjcZblgg2MrO Dec 3 08:08:17 np0005543225 certmonger[47696]: C/1qvEPUSdfbFwIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:08:17 np0005543225 certmonger[47696]: ADAAMwAwADgAMAA4ADEANzCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Dec 3 08:08:17 np0005543225 certmonger[47696]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU1NDMyMjUuaW50ZXJuYWxhcGkub29v Dec 3 08:08:17 np0005543225 certmonger[47696]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Dec 3 08:08:17 np0005543225 certmonger[47696]: FAIDoDIMMHJlZGlzL25wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdEBP Dec 3 08:08:17 np0005543225 certmonger[47696]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Dec 3 08:08:17 np0005543225 certmonger[47696]: cmVkaXMbIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Dec 3 08:08:17 np0005543225 certmonger[47696]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Dec 3 08:08:17 np0005543225 certmonger[47696]: VPYcTyRmLoBy2u7FwH5js7/mtWIwDQYJKoZIhvcNAQELBQADggEBAE4Ty00cwbil Dec 3 08:08:17 np0005543225 certmonger[47696]: p+wJY5IwhQa4RDPNsmsGxuVWwO1ZTgcOWwvKEvPlXmQ7D2gEJPdfvt9PJfvXVcp4 Dec 3 08:08:17 np0005543225 certmonger[47696]: 1yUk2q8Y17PdqEld/N0mX6DwQYm+6+8viAghC+qpGVg4qXnp8rErzAfpM2ePdnhP Dec 3 08:08:17 np0005543225 certmonger[47696]: lTIH5xmao1OZ8y0gb0Cd3Cw6H66JOqtP7lpLJ8K2hi8cIUATKmIQIYmS7KrA8zDB Dec 3 08:08:17 np0005543225 certmonger[47696]: JtZTnKXSZ10oHO42r5TOYfTu+Y3KVEpbmtmb8DGmx07lbbdvUgprx6W8Co0Xx7Ud Dec 3 08:08:17 np0005543225 certmonger[47696]: yKW2tyenV6rw+vRmG625NDJt9MdnK9xFg3VJ7AgF3HXnGSWDri87vmpe9DMIgrbN Dec 3 08:08:17 np0005543225 certmonger[47696]: 2/N4WNbO0bc= Dec 3 08:08:17 np0005543225 certmonger[47696]: -----END CERTIFICATE REQUEST----- Dec 3 08:08:17 np0005543225 certmonger[47696]: " for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAjcqdpjtCOf1aLGIankbw1cKL/yngO3S858VeZxJ7bIqNY8D4/5KuCF/XSU+N1Tqkay/F8bV+YCjVv0pWpUHgFVvnojNfbgAEJpu8YvERGmezvuRVpdDSiCHGQbT9dMaiLLGFIUtTOkvIKi9fgxQ9mXx8dq7T4zGlysb6AC0/o4rTUPzOdDXnpZlccxI5db87rP6Z43YXuTgb5dYGXMei4aG4pBkUGxvIa1n0hSc8PC8pv6owVZT/6MusQqwLggUm5KmwHCu5ooAhdRVmD/35k5m0E2IjcYAQUBPVsOrO5yWC5OmJzkRIjqIGbxOpQjcZblgg2MrOC/1qvEPUSdfbFwIDAQAB" for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:08:17 np0005543225 certmonger[47696]: 2025-12-03 08:08:17 [47696] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[47696]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:08:17 np0005543225 certmonger[47696]: Certificate: "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" Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Certificate submission still ongoing. Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Certificate submission attempt complete. Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Child status = 0. Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Child output: Dec 3 08:08:17 np0005543225 certmonger[38530]: "-----BEGIN CERTIFICATE----- Dec 3 08:08:17 np0005543225 certmonger[38530]: MIIFdzCCA9+gAwIBAgIBSjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:08:17 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:08:17 np0005543225 certmonger[38530]: MDgxN1oXDTI3MTIwNDA4MDgxN1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:08:17 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:08:17 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAI3KnaY7Qjn9WixiGp5G8NXCi/8p4Dt0vOfF Dec 3 08:08:17 np0005543225 certmonger[38530]: XmcSe2yKjWPA+P+Srghf10lPjdU6pGsvxfG1fmAo1b9KVqVB4BVb56IzX24ABCab Dec 3 08:08:17 np0005543225 certmonger[38530]: vGLxERpns77kVaXQ0oghxkG0/XTGoiyxhSFLUzpLyCovX4MUPZl8fHau0+MxpcrG Dec 3 08:08:17 np0005543225 certmonger[38530]: +gAtP6OK01D8znQ156WZXHMSOXW/O6z+meN2F7k4G+XWBlzHouGhuKQZFBsbyGtZ Dec 3 08:08:17 np0005543225 certmonger[38530]: 9IUnPDwvKb+qMFWU/+jLrEKsC4IFJuSpsBwruaKAIXUVZg/9+ZOZtBNiI3GAEFAT Dec 3 08:08:17 np0005543225 certmonger[38530]: 1bDqzuclguTpic5ESI6iBm8TqUI3GW5YINjKzgv9arxD1EnX2xcCAwEAAaOCAggw Dec 3 08:08:17 np0005543225 certmonger[38530]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:08:17 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:08:17 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:08:17 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:08:17 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:08:17 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEOIDPh2Ua7WE+ir0xZ7vG8l Dec 3 08:08:17 np0005543225 certmonger[38530]: BH7WMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:08:17 np0005543225 certmonger[38530]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:08:17 np0005543225 certmonger[38530]: AgOgMgwwcmVkaXMvbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:08:17 np0005543225 certmonger[38530]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy Dec 3 08:08:17 np0005543225 certmonger[38530]: ZWRpcxshbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:08:17 np0005543225 certmonger[38530]: DQEBCwUAA4IBgQBxC8+gQHySRddOryFKRqeVKW4R7JY9zFC26HAsM4oI6v4Odhfr Dec 3 08:08:17 np0005543225 certmonger[38530]: DEu0WEhM3WdoDPVe0s3tHLhtshUVHLUi6LRUr80My3lDfqhgNc+hMmXK8v3t5kta Dec 3 08:08:17 np0005543225 certmonger[38530]: xKncbVzHzCrxATnKhTGoSNdj3RBMGIFqhZbR6cosTkhFzC2KCLc+0DFDLhFWa59Y Dec 3 08:08:17 np0005543225 certmonger[38530]: MW6iJsEKwIgWT8En0IhgiAU5ZOfEU9yGda91m7jLsF6gnrmerbmIWnP7w6Y6U/xz Dec 3 08:08:17 np0005543225 certmonger[38530]: OP2OQa2QHHfs0hVYrol9TRw9YISKACjW/A41lF9q0EsSY1LPjS1FManCNDg/p2Fl Dec 3 08:08:17 np0005543225 certmonger[38530]: /kKGB3LzqBBMPjX0432y3hhI6klaSkHJHJ+r/1eTRJUl8Gt1MbncxGDI2YtPtzw/ Dec 3 08:08:17 np0005543225 certmonger[38530]: PAVOMbizgXJQqYTIn8FmeY72cGwZmf65QE2xKdhUJYEJfsIz4uV7VESmdxkKlAbW Dec 3 08:08:17 np0005543225 certmonger[38530]: XBrbP5Yc8E8rcI/37CjW/Dt3iS1j8Kszo008uqZI2Hj7gfvRwzKJOYFG8PQ1pPxV Dec 3 08:08:17 np0005543225 certmonger[38530]: WdnqjcGKjPh8n1I= Dec 3 08:08:17 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:08:17 np0005543225 certmonger[38530]: " Dec 3 08:08:17 np0005543225 certmonger[47698]: 2025-12-03 08:08:17 [47698] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:08:17 np0005543225 certmonger[47698]: MIIFdzCCA9+gAwIBAgIBSjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:08:17 np0005543225 certmonger[47698]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:08:17 np0005543225 certmonger[47698]: MDgxN1oXDTI3MTIwNDA4MDgxN1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:08:17 np0005543225 certmonger[47698]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:08:17 np0005543225 certmonger[47698]: hvcNAQEBBQADggEPADCCAQoCggEBAI3KnaY7Qjn9WixiGp5G8NXCi/8p4Dt0vOfF Dec 3 08:08:17 np0005543225 certmonger[47698]: XmcSe2yKjWPA+P+Srghf10lPjdU6pGsvxfG1fmAo1b9KVqVB4BVb56IzX24ABCab Dec 3 08:08:17 np0005543225 certmonger[47698]: vGLxERpns77kVaXQ0oghxkG0/XTGoiyxhSFLUzpLyCovX4MUPZl8fHau0+MxpcrG Dec 3 08:08:17 np0005543225 certmonger[47698]: +gAtP6OK01D8znQ156WZXHMSOXW/O6z+meN2F7k4G+XWBlzHouGhuKQZFBsbyGtZ Dec 3 08:08:17 np0005543225 certmonger[47698]: 9IUnPDwvKb+qMFWU/+jLrEKsC4IFJuSpsBwruaKAIXUVZg/9+ZOZtBNiI3GAEFAT Dec 3 08:08:17 np0005543225 certmonger[47698]: 1bDqzuclguTpic5ESI6iBm8TqUI3GW5YINjKzgv9arxD1EnX2xcCAwEAAaOCAggw Dec 3 08:08:17 np0005543225 certmonger[47698]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:08:17 np0005543225 certmonger[47698]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:08:17 np0005543225 certmonger[47698]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:08:17 np0005543225 certmonger[47698]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:08:17 np0005543225 certmonger[47698]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:08:17 np0005543225 certmonger[47698]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEOIDPh2Ua7WE+ir0xZ7vG8l Dec 3 08:08:17 np0005543225 certmonger[47698]: BH7WMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:08:17 np0005543225 certmonger[47698]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:08:17 np0005543225 certmonger[47698]: AgOgMgwwcmVkaXMvbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:08:17 np0005543225 certmonger[47698]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy Dec 3 08:08:17 np0005543225 certmonger[47698]: ZWRpcxshbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:08:17 np0005543225 certmonger[47698]: DQEBCwUAA4IBgQBxC8+gQHySRddOryFKRqeVKW4R7JY9zFC26HAsM4oI6v4Odhfr Dec 3 08:08:17 np0005543225 certmonger[47698]: DEu0WEhM3WdoDPVe0s3tHLhtshUVHLUi6LRUr80My3lDfqhgNc+hMmXK8v3t5kta Dec 3 08:08:17 np0005543225 certmonger[47698]: xKncbVzHzCrxATnKhTGoSNdj3RBMGIFqhZbR6cosTkhFzC2KCLc+0DFDLhFWa59Y Dec 3 08:08:17 np0005543225 certmonger[47698]: MW6iJsEKwIgWT8En0IhgiAU5ZOfEU9yGda91m7jLsF6gnrmerbmIWnP7w6Y6U/xz Dec 3 08:08:17 np0005543225 certmonger[47698]: OP2OQa2QHHfs0hVYrol9TRw9YISKACjW/A41lF9q0EsSY1LPjS1FManCNDg/p2Fl Dec 3 08:08:17 np0005543225 certmonger[47698]: /kKGB3LzqBBMPjX0432y3hhI6klaSkHJHJ+r/1eTRJUl8Gt1MbncxGDI2YtPtzw/ Dec 3 08:08:17 np0005543225 certmonger[47698]: PAVOMbizgXJQqYTIn8FmeY72cGwZmf65QE2xKdhUJYEJfsIz4uV7VESmdxkKlAbW Dec 3 08:08:17 np0005543225 certmonger[47698]: XBrbP5Yc8E8rcI/37CjW/Dt3iS1j8Kszo008uqZI2Hj7gfvRwzKJOYFG8PQ1pPxV Dec 3 08:08:17 np0005543225 certmonger[47698]: WdnqjcGKjPh8n1I= Dec 3 08:08:17 np0005543225 certmonger[47698]: -----END CERTIFICATE----- Dec 3 08:08:17 np0005543225 certmonger[47698]: ". Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Certificate submission still ongoing. Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Certificate submission postprocessing complete. Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Child status = 0. Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Child output: Dec 3 08:08:17 np0005543225 certmonger[38530]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nWdnqjcGKjPh8n1I=\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:08:17 np0005543225 certmonger[38530]: " Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:08:17 np0005543225 certmonger[38530]: MIIFdzCCA9+gAwIBAgIBSjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:08:17 np0005543225 certmonger[38530]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:08:17 np0005543225 certmonger[38530]: MDgxN1oXDTI3MTIwNDA4MDgxN1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:08:17 np0005543225 certmonger[38530]: BAMMIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:08:17 np0005543225 certmonger[38530]: hvcNAQEBBQADggEPADCCAQoCggEBAI3KnaY7Qjn9WixiGp5G8NXCi/8p4Dt0vOfF Dec 3 08:08:17 np0005543225 certmonger[38530]: XmcSe2yKjWPA+P+Srghf10lPjdU6pGsvxfG1fmAo1b9KVqVB4BVb56IzX24ABCab Dec 3 08:08:17 np0005543225 certmonger[38530]: vGLxERpns77kVaXQ0oghxkG0/XTGoiyxhSFLUzpLyCovX4MUPZl8fHau0+MxpcrG Dec 3 08:08:17 np0005543225 certmonger[38530]: +gAtP6OK01D8znQ156WZXHMSOXW/O6z+meN2F7k4G+XWBlzHouGhuKQZFBsbyGtZ Dec 3 08:08:17 np0005543225 certmonger[38530]: 9IUnPDwvKb+qMFWU/+jLrEKsC4IFJuSpsBwruaKAIXUVZg/9+ZOZtBNiI3GAEFAT Dec 3 08:08:17 np0005543225 certmonger[38530]: 1bDqzuclguTpic5ESI6iBm8TqUI3GW5YINjKzgv9arxD1EnX2xcCAwEAAaOCAggw Dec 3 08:08:17 np0005543225 certmonger[38530]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:08:17 np0005543225 certmonger[38530]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:08:17 np0005543225 certmonger[38530]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:08:17 np0005543225 certmonger[38530]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:08:17 np0005543225 certmonger[38530]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:08:17 np0005543225 certmonger[38530]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFEOIDPh2Ua7WE+ir0xZ7vG8l Dec 3 08:08:17 np0005543225 certmonger[38530]: BH7WMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNS5pbnRlcm5hbGFwaS5vb28u Dec 3 08:08:17 np0005543225 certmonger[38530]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:08:17 np0005543225 certmonger[38530]: AgOgMgwwcmVkaXMvbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:08:17 np0005543225 certmonger[38530]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy Dec 3 08:08:17 np0005543225 certmonger[38530]: ZWRpcxshbnAwMDA1NTQzMjI1LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:08:17 np0005543225 certmonger[38530]: DQEBCwUAA4IBgQBxC8+gQHySRddOryFKRqeVKW4R7JY9zFC26HAsM4oI6v4Odhfr Dec 3 08:08:17 np0005543225 certmonger[38530]: DEu0WEhM3WdoDPVe0s3tHLhtshUVHLUi6LRUr80My3lDfqhgNc+hMmXK8v3t5kta Dec 3 08:08:17 np0005543225 certmonger[38530]: xKncbVzHzCrxATnKhTGoSNdj3RBMGIFqhZbR6cosTkhFzC2KCLc+0DFDLhFWa59Y Dec 3 08:08:17 np0005543225 certmonger[38530]: MW6iJsEKwIgWT8En0IhgiAU5ZOfEU9yGda91m7jLsF6gnrmerbmIWnP7w6Y6U/xz Dec 3 08:08:17 np0005543225 certmonger[38530]: OP2OQa2QHHfs0hVYrol9TRw9YISKACjW/A41lF9q0EsSY1LPjS1FManCNDg/p2Fl Dec 3 08:08:17 np0005543225 certmonger[38530]: /kKGB3LzqBBMPjX0432y3hhI6klaSkHJHJ+r/1eTRJUl8Gt1MbncxGDI2YtPtzw/ Dec 3 08:08:17 np0005543225 certmonger[38530]: PAVOMbizgXJQqYTIn8FmeY72cGwZmf65QE2xKdhUJYEJfsIz4uV7VESmdxkKlAbW Dec 3 08:08:17 np0005543225 certmonger[38530]: XBrbP5Yc8E8rcI/37CjW/Dt3iS1j8Kszo008uqZI2Hj7gfvRwzKJOYFG8PQ1pPxV Dec 3 08:08:17 np0005543225 certmonger[38530]: WdnqjcGKjPh8n1I= Dec 3 08:08:17 np0005543225 certmonger[38530]: -----END CERTIFICATE----- Dec 3 08:08:17 np0005543225 certmonger[38530]: ". Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] No hooks set for pre-save command. Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 certmonger[38530]: 2025-12-03 08:08:17 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:17 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:18 np0005543225 certmonger[38530]: 2025-12-03 08:08:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543225 certmonger[38530]: 2025-12-03 08:08:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543225 certmonger[47776]: Certificate in file "/etc/pki/tls/certs/redis.crt" issued by CA and saved. Dec 3 08:08:18 np0005543225 certmonger[38530]: 2025-12-03 08:08:18 [38530] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543225 python3[47792]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:08:18 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:20 np0005543225 podman[47793]: 2025-12-03 08:08:18.963806179 +0000 UTC m=+0.066575174 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 08:08:20 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:21 np0005543225 python3[47846]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 cluster.common.tag/redis:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:08:21 np0005543225 podman[47847]: 2025-12-03 08:08:21.355711938 +0000 UTC m=+0.060600183 image tag b9d7c6447d3e11e4b7bc4c1a8872a5471a9020b0347f9e0a44060d9b2823bfe3 cluster.common.tag/redis:pcmklatest Dec 3 08:08:21 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:21 np0005543225 python3[47874]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:08:22 np0005543225 python3[47923]: ansible-ansible.legacy.stat Invoked with path=/etc/rsyslog.d/openstack-swift.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 08:08:22 np0005543225 python3[47966]: ansible-ansible.legacy.copy Invoked with dest=/etc/rsyslog.d/openstack-swift.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764749301.9146492-115859-173979778340524/source _original_basename=tmpw4q86t34 follow=False checksum=c046f7cecbacf1ea879045a0e157e300a2726c73 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:08:23 np0005543225 python3[47996]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 08:08:23 np0005543225 systemd[1]: Stopping System Logging Service... Dec 3 08:08:23 np0005543225 rsyslogd[39695]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="39695" x-info="https://www.rsyslog.com"] exiting on signal 15. Dec 3 08:08:23 np0005543225 systemd[1]: rsyslog.service: Deactivated successfully. Dec 3 08:08:23 np0005543225 systemd[1]: Stopped System Logging Service. Dec 3 08:08:23 np0005543225 systemd[1]: Starting System Logging Service... Dec 3 08:08:23 np0005543225 rsyslogd[47999]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="47999" x-info="https://www.rsyslog.com"] start Dec 3 08:08:23 np0005543225 systemd[1]: Started System Logging Service. Dec 3 08:08:23 np0005543225 rsyslogd[47999]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 08:08:24 np0005543225 python3[48018]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 08:08:25 np0005543225 ansible-async_wrapper.py[48190]: Invoked with 817977229739 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1764749305.3475852-115985-210193869322754/AnsiballZ_command.py _ Dec 3 08:08:25 np0005543225 ansible-async_wrapper.py[48193]: Starting module and watcher Dec 3 08:08:25 np0005543225 ansible-async_wrapper.py[48193]: Start watching 48194 (3600) Dec 3 08:08:25 np0005543225 ansible-async_wrapper.py[48194]: Start module (48194) Dec 3 08:08:25 np0005543225 ansible-async_wrapper.py[48190]: Return async_wrapper task started. Dec 3 08:08:26 np0005543225 python3[48214]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:08:30 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3600) Dec 3 08:08:32 np0005543225 puppet-user[48212]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 08:08:32 np0005543225 puppet-user[48212]: (file: /etc/puppet/hiera.yaml) Dec 3 08:08:32 np0005543225 puppet-user[48212]: Warning: Undefined variable '::deploy_config_name'; Dec 3 08:08:32 np0005543225 puppet-user[48212]: (file & line not available) Dec 3 08:08:32 np0005543225 puppet-user[48212]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 08:08:32 np0005543225 puppet-user[48212]: (file & line not available) Dec 3 08:08:32 np0005543225 puppet-user[48212]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Dec 3 08:08:32 np0005543225 puppet-user[48212]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Dec 3 08:08:32 np0005543225 puppet-user[48212]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.38 seconds Dec 3 08:08:32 np0005543225 sssd_nss[38229]: Enumeration requested but not enabled Dec 3 08:08:32 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Exec[directory-create-etc-my.cnf.d]/returns: executed successfully Dec 3 08:08:32 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 08:08:32 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 08:08:35 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3595) Dec 3 08:08:36 np0005543225 sshd[48340]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:08:36 np0005543225 python3[48357]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:08:40 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3590) Dec 3 08:08:43 np0005543225 dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Dec 3 08:08:44 np0005543225 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 08:08:44 np0005543225 systemd[1]: Starting man-db-cache-update.service... Dec 3 08:08:44 np0005543225 systemd[1]: Reloading. Dec 3 08:08:44 np0005543225 systemd-rc-local-generator[48521]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:44 np0005543225 systemd-sysv-generator[48526]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:44 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:44 np0005543225 systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 08:08:45 np0005543225 rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 08:08:45 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Pacemaker::Install/Package[pacemaker]/ensure: created Dec 3 08:08:45 np0005543225 systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 08:08:45 np0005543225 systemd[1]: Finished man-db-cache-update.service. Dec 3 08:08:45 np0005543225 systemd[1]: man-db-cache-update.service: Consumed 2.078s CPU time. Dec 3 08:08:45 np0005543225 systemd[1]: run-r71de5d494c5f4ded94fc43edc3669b47.service: Deactivated successfully. Dec 3 08:08:45 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3585) Dec 3 08:08:46 np0005543225 python3[50241]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:08:50 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3580) Dec 3 08:08:51 np0005543225 systemd[1]: Reloading. Dec 3 08:08:51 np0005543225 systemd-rc-local-generator[50286]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:51 np0005543225 systemd-sysv-generator[50293]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:52 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:52 np0005543225 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 08:08:52 np0005543225 systemd[1]: Starting man-db-cache-update.service... Dec 3 08:08:52 np0005543225 systemd[1]: Reloading. Dec 3 08:08:52 np0005543225 systemd-rc-local-generator[50359]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:52 np0005543225 systemd-sysv-generator[50362]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:52 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:52 np0005543225 systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 08:08:52 np0005543225 systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 08:08:52 np0005543225 systemd[1]: Finished man-db-cache-update.service. Dec 3 08:08:52 np0005543225 systemd[1]: run-r06236077f2a44386a0d817d0d501d61f.service: Deactivated successfully. Dec 3 08:08:53 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Pacemaker::Install/Package[pcs]/ensure: created Dec 3 08:08:53 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Pacemaker::Corosync/File_line[pcsd_bind_addr]/ensure: created Dec 3 08:08:54 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/password: changed [redacted] to [redacted] Dec 3 08:08:54 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/groups: groups changed to ['haclient'] Dec 3 08:08:54 np0005543225 systemd[1]: Reloading. Dec 3 08:08:54 np0005543225 systemd-sysv-generator[50478]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:54 np0005543225 systemd-rc-local-generator[50475]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:54 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:54 np0005543225 systemd[1]: Starting PCS GUI and remote configuration interface (Ruby)... Dec 3 08:08:55 np0005543225 pcsd[50488]: 2025-12-03 08:08:55 +0000 INFO Notifying systemd we are running (socket /run/systemd/notify) Dec 3 08:08:55 np0005543225 systemd[1]: Started PCS GUI and remote configuration interface (Ruby). Dec 3 08:08:55 np0005543225 systemd[1]: Starting PCS GUI and remote configuration interface... Dec 3 08:08:55 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3575) Dec 3 08:08:57 np0005543225 python3[50583]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:08:58 np0005543225 systemd[1]: Started PCS GUI and remote configuration interface. Dec 3 08:08:58 np0005543225 systemd[1]: Reloading. Dec 3 08:08:58 np0005543225 systemd-sysv-generator[50633]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:58 np0005543225 systemd-rc-local-generator[50630]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:58 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:58 np0005543225 systemd[1]: Reloading. Dec 3 08:08:58 np0005543225 systemd-rc-local-generator[50665]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:58 np0005543225 systemd-sysv-generator[50670]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:58 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:58 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Pacemaker::Service/Service[pcsd]/ensure: ensure changed 'stopped' to 'running' Dec 3 08:08:59 np0005543225 puppet-user[48212]: Notice: /Stage[main]/Pacemaker::Corosync/Exec[check-for-local-authentication]/returns: executed successfully Dec 3 08:09:00 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3570) Dec 3 08:09:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3565) Dec 3 08:09:07 np0005543225 python3[50717]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3560) Dec 3 08:09:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3555) Dec 3 08:09:17 np0005543225 python3[50750]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3550) Dec 3 08:09:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3545) Dec 3 08:09:28 np0005543225 python3[50783]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3540) Dec 3 08:09:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3535) Dec 3 08:09:38 np0005543225 python3[50816]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3530) Dec 3 08:09:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3525) Dec 3 08:09:48 np0005543225 python3[50849]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3520) Dec 3 08:09:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3515) Dec 3 08:09:59 np0005543225 python3[50882]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3510) Dec 3 08:10:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3505) Dec 3 08:10:09 np0005543225 python3[50915]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3500) Dec 3 08:10:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3495) Dec 3 08:10:19 np0005543225 python3[50948]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3490) Dec 3 08:10:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3485) Dec 3 08:10:29 np0005543225 python3[50981]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3480) Dec 3 08:10:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3475) Dec 3 08:10:38 np0005543225 sshd[50982]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:10:40 np0005543225 python3[51004]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3470) Dec 3 08:10:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3465) Dec 3 08:10:50 np0005543225 python3[51032]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3460) Dec 3 08:10:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3455) Dec 3 08:11:00 np0005543225 python3[51065]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3450) Dec 3 08:11:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3445) Dec 3 08:11:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3440) Dec 3 08:11:11 np0005543225 python3[51098]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3435) Dec 3 08:11:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3430) Dec 3 08:11:21 np0005543225 python3[51131]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3425) Dec 3 08:11:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3420) Dec 3 08:11:31 np0005543225 python3[51164]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3415) Dec 3 08:11:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3410) Dec 3 08:11:42 np0005543225 python3[51197]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3405) Dec 3 08:11:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3400) Dec 3 08:11:52 np0005543225 python3[51230]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3395) Dec 3 08:12:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3390) Dec 3 08:12:02 np0005543225 python3[51263]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3385) Dec 3 08:12:08 np0005543225 systemd[1]: Starting dnf makecache... Dec 3 08:12:08 np0005543225 dnf[51267]: Updating Subscription Management repositories. Dec 3 08:12:10 np0005543225 dnf[51267]: Metadata cache refreshed recently. Dec 3 08:12:10 np0005543225 systemd[1]: dnf-makecache.service: Deactivated successfully. Dec 3 08:12:10 np0005543225 systemd[1]: Finished dnf makecache. Dec 3 08:12:10 np0005543225 systemd[1]: dnf-makecache.service: Consumed 1.993s CPU time. Dec 3 08:12:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3380) Dec 3 08:12:13 np0005543225 python3[51297]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3375) Dec 3 08:12:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3370) Dec 3 08:12:23 np0005543225 python3[51330]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3365) Dec 3 08:12:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3360) Dec 3 08:12:33 np0005543225 python3[51363]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3355) Dec 3 08:12:37 np0005543225 sshd[51364]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:12:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3350) Dec 3 08:12:43 np0005543225 python3[51399]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3345) Dec 3 08:12:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3340) Dec 3 08:12:54 np0005543225 python3[51422]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3335) Dec 3 08:13:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3330) Dec 3 08:13:04 np0005543225 python3[51448]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3325) Dec 3 08:13:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3320) Dec 3 08:13:14 np0005543225 python3[51481]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3315) Dec 3 08:13:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3310) Dec 3 08:13:25 np0005543225 python3[51514]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3305) Dec 3 08:13:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3300) Dec 3 08:13:35 np0005543225 python3[51547]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3295) Dec 3 08:13:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3290) Dec 3 08:13:45 np0005543225 python3[51580]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3285) Dec 3 08:13:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3280) Dec 3 08:13:56 np0005543225 python3[51613]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3275) Dec 3 08:14:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3270) Dec 3 08:14:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3265) Dec 3 08:14:06 np0005543225 python3[51646]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3260) Dec 3 08:14:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3255) Dec 3 08:14:16 np0005543225 python3[51680]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3250) Dec 3 08:14:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3245) Dec 3 08:14:27 np0005543225 python3[51714]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3240) Dec 3 08:14:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3235) Dec 3 08:14:37 np0005543225 python3[51747]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:38 np0005543225 sshd[51748]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:14:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3230) Dec 3 08:14:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3225) Dec 3 08:14:47 np0005543225 python3[51782]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3220) Dec 3 08:14:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3215) Dec 3 08:14:57 np0005543225 python3[51815]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3210) Dec 3 08:15:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3205) Dec 3 08:15:08 np0005543225 python3[51840]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3200) Dec 3 08:15:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3195) Dec 3 08:15:18 np0005543225 python3[51866]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3190) Dec 3 08:15:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3185) Dec 3 08:15:28 np0005543225 python3[51899]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3180) Dec 3 08:15:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3175) Dec 3 08:15:39 np0005543225 python3[51932]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3170) Dec 3 08:15:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3165) Dec 3 08:15:49 np0005543225 python3[51965]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3160) Dec 3 08:15:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3155) Dec 3 08:15:59 np0005543225 python3[51998]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3150) Dec 3 08:16:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3145) Dec 3 08:16:10 np0005543225 python3[52031]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3140) Dec 3 08:16:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3135) Dec 3 08:16:20 np0005543225 python3[52064]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3130) Dec 3 08:16:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3125) Dec 3 08:16:30 np0005543225 python3[52098]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3120) Dec 3 08:16:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3115) Dec 3 08:16:40 np0005543225 sshd[52116]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:16:41 np0005543225 python3[52133]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3110) Dec 3 08:16:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3105) Dec 3 08:16:51 np0005543225 python3[52166]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3100) Dec 3 08:16:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3095) Dec 3 08:17:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3090) Dec 3 08:17:01 np0005543225 python3[52199]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3085) Dec 3 08:17:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3080) Dec 3 08:17:12 np0005543225 python3[52232]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3075) Dec 3 08:17:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3070) Dec 3 08:17:22 np0005543225 python3[52255]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3065) Dec 3 08:17:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3060) Dec 3 08:17:32 np0005543225 python3[52281]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3055) Dec 3 08:17:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3050) Dec 3 08:17:42 np0005543225 python3[52314]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3045) Dec 3 08:17:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3040) Dec 3 08:17:53 np0005543225 python3[52348]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3035) Dec 3 08:18:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3030) Dec 3 08:18:03 np0005543225 python3[52381]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3025) Dec 3 08:18:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3020) Dec 3 08:18:13 np0005543225 python3[52414]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3015) Dec 3 08:18:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3010) Dec 3 08:18:24 np0005543225 python3[52447]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3005) Dec 3 08:18:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (3000) Dec 3 08:18:34 np0005543225 python3[52480]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2995) Dec 3 08:18:40 np0005543225 sshd[52498]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:18:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2990) Dec 3 08:18:44 np0005543225 python3[52515]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2985) Dec 3 08:18:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2980) Dec 3 08:18:55 np0005543225 python3[52548]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2975) Dec 3 08:19:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2970) Dec 3 08:19:05 np0005543225 python3[52581]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2965) Dec 3 08:19:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2960) Dec 3 08:19:15 np0005543225 python3[52614]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2955) Dec 3 08:19:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2950) Dec 3 08:19:26 np0005543225 python3[52647]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2945) Dec 3 08:19:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2940) Dec 3 08:19:36 np0005543225 python3[52679]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2935) Dec 3 08:19:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2930) Dec 3 08:19:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2925) Dec 3 08:19:47 np0005543225 python3[52699]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2920) Dec 3 08:19:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2915) Dec 3 08:19:57 np0005543225 python3[52730]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2910) Dec 3 08:20:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2905) Dec 3 08:20:07 np0005543225 python3[52763]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2900) Dec 3 08:20:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2895) Dec 3 08:20:17 np0005543225 python3[52797]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2890) Dec 3 08:20:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2885) Dec 3 08:20:28 np0005543225 python3[52830]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2880) Dec 3 08:20:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2875) Dec 3 08:20:38 np0005543225 python3[52863]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:41 np0005543225 sshd[52864]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:20:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2870) Dec 3 08:20:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2865) Dec 3 08:20:48 np0005543225 python3[52898]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2860) Dec 3 08:20:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2855) Dec 3 08:20:59 np0005543225 python3[52931]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2850) Dec 3 08:21:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2845) Dec 3 08:21:09 np0005543225 python3[52964]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2840) Dec 3 08:21:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2835) Dec 3 08:21:19 np0005543225 python3[52997]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2830) Dec 3 08:21:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2825) Dec 3 08:21:30 np0005543225 python3[53030]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2820) Dec 3 08:21:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2815) Dec 3 08:21:40 np0005543225 python3[53063]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2810) Dec 3 08:21:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2805) Dec 3 08:21:50 np0005543225 python3[53096]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2800) Dec 3 08:21:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2795) Dec 3 08:22:00 np0005543225 python3[53116]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2790) Dec 3 08:22:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2785) Dec 3 08:22:11 np0005543225 python3[53145]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2780) Dec 3 08:22:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2775) Dec 3 08:22:21 np0005543225 python3[53178]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2770) Dec 3 08:22:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2765) Dec 3 08:22:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2760) Dec 3 08:22:31 np0005543225 python3[53211]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2755) Dec 3 08:22:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2750) Dec 3 08:22:42 np0005543225 python3[53244]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:43 np0005543225 sshd[53245]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:22:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2745) Dec 3 08:22:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2740) Dec 3 08:22:52 np0005543225 python3[53279]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2735) Dec 3 08:23:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2730) Dec 3 08:23:02 np0005543225 python3[53312]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2725) Dec 3 08:23:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2720) Dec 3 08:23:13 np0005543225 python3[53345]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2715) Dec 3 08:23:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2710) Dec 3 08:23:23 np0005543225 python3[53379]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2705) Dec 3 08:23:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2700) Dec 3 08:23:33 np0005543225 python3[53412]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2695) Dec 3 08:23:41 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2690) Dec 3 08:23:44 np0005543225 python3[53445]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:46 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2685) Dec 3 08:23:51 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2680) Dec 3 08:23:54 np0005543225 python3[53478]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:56 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2675) Dec 3 08:24:01 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2670) Dec 3 08:24:04 np0005543225 python3[53507]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:06 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2665) Dec 3 08:24:11 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2660) Dec 3 08:24:15 np0005543225 python3[53529]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:16 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2655) Dec 3 08:24:21 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2650) Dec 3 08:24:25 np0005543225 python3[53560]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:26 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2645) Dec 3 08:24:31 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2640) Dec 3 08:24:35 np0005543225 python3[53593]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:36 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2635) Dec 3 08:24:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2630) Dec 3 08:24:44 np0005543225 systemd[1]: session-15.scope: Deactivated successfully. Dec 3 08:24:44 np0005543225 systemd[1]: session-15.scope: Consumed 3.149s CPU time. Dec 3 08:24:44 np0005543225 systemd-logind[35952]: Session 15 logged out. Waiting for processes to exit. Dec 3 08:24:44 np0005543225 systemd-logind[35952]: Removed session 15. Dec 3 08:24:46 np0005543225 python3[53627]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:46 np0005543225 sshd[53628]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:24:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2625) Dec 3 08:24:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2620) Dec 3 08:24:54 np0005543225 systemd[1]: Stopping User Manager for UID 1000... Dec 3 08:24:54 np0005543225 systemd[4176]: Activating special unit Exit the Session... Dec 3 08:24:54 np0005543225 systemd[4176]: Stopping podman-pause-c55b88ba.scope... Dec 3 08:24:54 np0005543225 systemd[4176]: Removed slice User Background Tasks Slice. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped target Main User Target. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped target Basic System. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped target Paths. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped target Sockets. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped target Timers. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped Mark boot as successful after the user session has run 2 minutes. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped Daily Cleanup of User's Temporary Directories. Dec 3 08:24:54 np0005543225 dbus-broker[18477]: Dispatched 3289 messages @ 2(±27)μs / message. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopping D-Bus User Message Bus... Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped Create User's Volatile Files and Directories. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped podman-pause-c55b88ba.scope. Dec 3 08:24:54 np0005543225 systemd[4176]: Removed slice Slice /user. Dec 3 08:24:54 np0005543225 systemd[4176]: Stopped D-Bus User Message Bus. Dec 3 08:24:54 np0005543225 systemd[4176]: Closed D-Bus User Message Bus Socket. Dec 3 08:24:54 np0005543225 systemd[4176]: Removed slice User Application Slice. Dec 3 08:24:54 np0005543225 systemd[4176]: Reached target Shutdown. Dec 3 08:24:54 np0005543225 systemd[4176]: Finished Exit the Session. Dec 3 08:24:54 np0005543225 systemd[4176]: Reached target Exit the Session. Dec 3 08:24:54 np0005543225 systemd[1]: user@1000.service: Deactivated successfully. Dec 3 08:24:54 np0005543225 systemd[1]: Stopped User Manager for UID 1000. Dec 3 08:24:54 np0005543225 systemd[1]: user@1000.service: Consumed 1.659s CPU time, read 20.0K from disk, written 4.0K to disk. Dec 3 08:24:56 np0005543225 python3[53664]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2615) Dec 3 08:25:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2610) Dec 3 08:25:06 np0005543225 python3[53697]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2605) Dec 3 08:25:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2600) Dec 3 08:25:16 np0005543225 python3[53730]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2595) Dec 3 08:25:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2590) Dec 3 08:25:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2585) Dec 3 08:25:27 np0005543225 python3[53764]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2580) Dec 3 08:25:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2575) Dec 3 08:25:37 np0005543225 python3[53797]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2570) Dec 3 08:25:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2565) Dec 3 08:25:47 np0005543225 python3[53830]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2560) Dec 3 08:25:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2555) Dec 3 08:25:58 np0005543225 python3[53863]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2550) Dec 3 08:26:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2545) Dec 3 08:26:08 np0005543225 python3[53896]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2540) Dec 3 08:26:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2535) Dec 3 08:26:18 np0005543225 python3[53926]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2530) Dec 3 08:26:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2525) Dec 3 08:26:29 np0005543225 python3[53947]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2520) Dec 3 08:26:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2515) Dec 3 08:26:39 np0005543225 python3[53978]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2510) Dec 3 08:26:45 np0005543225 sshd[53996]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:26:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2505) Dec 3 08:26:49 np0005543225 python3[54013]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2500) Dec 3 08:26:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2495) Dec 3 08:26:59 np0005543225 python3[54046]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2490) Dec 3 08:27:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2485) Dec 3 08:27:10 np0005543225 python3[54079]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2480) Dec 3 08:27:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2475) Dec 3 08:27:20 np0005543225 python3[54112]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2470) Dec 3 08:27:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2465) Dec 3 08:27:30 np0005543225 python3[54145]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2460) Dec 3 08:27:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2455) Dec 3 08:27:41 np0005543225 python3[54178]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2450) Dec 3 08:27:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2445) Dec 3 08:27:51 np0005543225 python3[54211]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2440) Dec 3 08:27:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2435) Dec 3 08:28:01 np0005543225 python3[54244]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2430) Dec 3 08:28:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2425) Dec 3 08:28:12 np0005543225 python3[54277]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2420) Dec 3 08:28:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2415) Dec 3 08:28:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2410) Dec 3 08:28:22 np0005543225 python3[54310]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2405) Dec 3 08:28:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2400) Dec 3 08:28:32 np0005543225 python3[54340]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2395) Dec 3 08:28:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2390) Dec 3 08:28:43 np0005543225 python3[54362]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2385) Dec 3 08:28:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2380) Dec 3 08:28:53 np0005543225 python3[54393]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2375) Dec 3 08:29:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2370) Dec 3 08:29:03 np0005543225 python3[54426]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2365) Dec 3 08:29:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2360) Dec 3 08:29:14 np0005543225 python3[54459]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2355) Dec 3 08:29:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2350) Dec 3 08:29:24 np0005543225 python3[54492]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2345) Dec 3 08:29:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2340) Dec 3 08:29:34 np0005543225 python3[54525]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2335) Dec 3 08:29:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2330) Dec 3 08:29:45 np0005543225 python3[54558]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2325) Dec 3 08:29:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2320) Dec 3 08:29:55 np0005543225 python3[54591]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2315) Dec 3 08:30:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2310) Dec 3 08:30:05 np0005543225 python3[54624]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2305) Dec 3 08:30:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2300) Dec 3 08:30:15 np0005543225 python3[54657]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2295) Dec 3 08:30:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2290) Dec 3 08:30:26 np0005543225 python3[54690]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2285) Dec 3 08:30:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2280) Dec 3 08:30:36 np0005543225 python3[54723]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2275) Dec 3 08:30:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2270) Dec 3 08:30:46 np0005543225 python3[54751]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2265) Dec 3 08:30:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2260) Dec 3 08:30:57 np0005543225 python3[54774]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2255) Dec 3 08:31:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2250) Dec 3 08:31:07 np0005543225 python3[54805]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2245) Dec 3 08:31:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2240) Dec 3 08:31:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2235) Dec 3 08:31:17 np0005543225 python3[54838]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2230) Dec 3 08:31:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2225) Dec 3 08:31:28 np0005543225 python3[54872]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2220) Dec 3 08:31:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2215) Dec 3 08:31:38 np0005543225 python3[54905]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2210) Dec 3 08:31:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2205) Dec 3 08:31:48 np0005543225 python3[54938]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2200) Dec 3 08:31:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2195) Dec 3 08:31:58 np0005543225 python3[54971]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2190) Dec 3 08:32:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2185) Dec 3 08:32:09 np0005543225 python3[55004]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2180) Dec 3 08:32:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2175) Dec 3 08:32:19 np0005543225 python3[55037]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2170) Dec 3 08:32:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2165) Dec 3 08:32:29 np0005543225 python3[55070]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2160) Dec 3 08:32:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2155) Dec 3 08:32:40 np0005543225 python3[55103]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2150) Dec 3 08:32:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2145) Dec 3 08:32:50 np0005543225 python3[55136]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2140) Dec 3 08:32:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2135) Dec 3 08:33:00 np0005543225 python3[55157]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2130) Dec 3 08:33:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2125) Dec 3 08:33:11 np0005543225 python3[55186]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2120) Dec 3 08:33:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2115) Dec 3 08:33:21 np0005543225 python3[55219]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2110) Dec 3 08:33:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2105) Dec 3 08:33:31 np0005543225 python3[55252]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2100) Dec 3 08:33:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2095) Dec 3 08:33:42 np0005543225 python3[55285]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2090) Dec 3 08:33:45 np0005543225 sshd[55303]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:33:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2085) Dec 3 08:33:52 np0005543225 python3[55319]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2080) Dec 3 08:33:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2075) Dec 3 08:34:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2070) Dec 3 08:34:02 np0005543225 python3[55353]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2065) Dec 3 08:34:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2060) Dec 3 08:34:13 np0005543225 python3[55387]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2055) Dec 3 08:34:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2050) Dec 3 08:34:23 np0005543225 python3[55420]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2045) Dec 3 08:34:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2040) Dec 3 08:34:33 np0005543225 python3[55453]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2035) Dec 3 08:34:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2030) Dec 3 08:34:43 np0005543225 python3[55486]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2025) Dec 3 08:34:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2020) Dec 3 08:34:54 np0005543225 python3[55519]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2015) Dec 3 08:35:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2010) Dec 3 08:35:04 np0005543225 python3[55552]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2005) Dec 3 08:35:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (2000) Dec 3 08:35:14 np0005543225 python3[55570]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1995) Dec 3 08:35:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1990) Dec 3 08:35:25 np0005543225 python3[55601]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1985) Dec 3 08:35:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1980) Dec 3 08:35:35 np0005543225 python3[55634]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1975) Dec 3 08:35:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1970) Dec 3 08:35:45 np0005543225 python3[55667]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1965) Dec 3 08:35:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1960) Dec 3 08:35:55 np0005543225 python3[55700]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1955) Dec 3 08:36:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1950) Dec 3 08:36:06 np0005543225 python3[55733]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1945) Dec 3 08:36:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1940) Dec 3 08:36:16 np0005543225 python3[55766]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1935) Dec 3 08:36:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1930) Dec 3 08:36:26 np0005543225 python3[55799]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1925) Dec 3 08:36:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1920) Dec 3 08:36:37 np0005543225 python3[55832]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1915) Dec 3 08:36:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1910) Dec 3 08:36:47 np0005543225 python3[55865]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1905) Dec 3 08:36:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1900) Dec 3 08:36:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1895) Dec 3 08:36:57 np0005543225 python3[55898]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1890) Dec 3 08:37:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1885) Dec 3 08:37:08 np0005543225 python3[55931]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1880) Dec 3 08:37:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1875) Dec 3 08:37:18 np0005543225 python3[55964]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1870) Dec 3 08:37:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1865) Dec 3 08:37:28 np0005543225 python3[55983]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1860) Dec 3 08:37:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1855) Dec 3 08:37:39 np0005543225 python3[56013]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1850) Dec 3 08:37:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1845) Dec 3 08:37:49 np0005543225 python3[56046]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1840) Dec 3 08:37:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1835) Dec 3 08:37:59 np0005543225 python3[56079]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1830) Dec 3 08:38:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1825) Dec 3 08:38:10 np0005543225 python3[56112]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1820) Dec 3 08:38:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1815) Dec 3 08:38:20 np0005543225 python3[56145]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1810) Dec 3 08:38:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1805) Dec 3 08:38:30 np0005543225 python3[56178]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1800) Dec 3 08:38:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1795) Dec 3 08:38:40 np0005543225 python3[56211]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1790) Dec 3 08:38:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1785) Dec 3 08:38:51 np0005543225 python3[56244]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1780) Dec 3 08:38:57 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1775) Dec 3 08:39:01 np0005543225 python3[56277]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:02 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1770) Dec 3 08:39:07 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1765) Dec 3 08:39:11 np0005543225 python3[56310]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:12 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1760) Dec 3 08:39:17 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1755) Dec 3 08:39:22 np0005543225 python3[56343]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:22 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1750) Dec 3 08:39:27 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1745) Dec 3 08:39:32 np0005543225 python3[56376]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:32 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1740) Dec 3 08:39:37 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1735) Dec 3 08:39:42 np0005543225 python3[56396]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:42 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1730) Dec 3 08:39:47 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1725) Dec 3 08:39:52 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1720) Dec 3 08:39:53 np0005543225 python3[56426]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1715) Dec 3 08:40:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1710) Dec 3 08:40:03 np0005543225 python3[56459]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1705) Dec 3 08:40:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1700) Dec 3 08:40:13 np0005543225 python3[56492]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1695) Dec 3 08:40:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1690) Dec 3 08:40:24 np0005543225 python3[56525]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1685) Dec 3 08:40:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1680) Dec 3 08:40:34 np0005543225 python3[56558]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1675) Dec 3 08:40:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1670) Dec 3 08:40:44 np0005543225 python3[56591]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1665) Dec 3 08:40:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1660) Dec 3 08:40:55 np0005543225 python3[56624]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1655) Dec 3 08:41:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1650) Dec 3 08:41:05 np0005543225 python3[56657]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1645) Dec 3 08:41:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1640) Dec 3 08:41:15 np0005543225 python3[56690]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1635) Dec 3 08:41:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1630) Dec 3 08:41:26 np0005543225 python3[56723]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1625) Dec 3 08:41:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1620) Dec 3 08:41:36 np0005543225 python3[56756]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1615) Dec 3 08:41:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1610) Dec 3 08:41:46 np0005543225 python3[56790]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1605) Dec 3 08:41:50 np0005543225 rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 08:41:51 np0005543225 rhsm-service[6640]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 08:41:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1600) Dec 3 08:41:57 np0005543225 python3[56986]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1595) Dec 3 08:42:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1590) Dec 3 08:42:07 np0005543225 python3[57018]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1585) Dec 3 08:42:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1580) Dec 3 08:42:17 np0005543225 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=185.180.140.110 DST=38.102.83.198 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=10866 PROTO=TCP SPT=13779 DPT=9090 SEQ=1549031990 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 3 08:42:17 np0005543225 python3[57051]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1575) Dec 3 08:42:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1570) Dec 3 08:42:28 np0005543225 python3[57085]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1565) Dec 3 08:42:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1560) Dec 3 08:42:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1555) Dec 3 08:42:38 np0005543225 python3[57118]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1550) Dec 3 08:42:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1545) Dec 3 08:42:48 np0005543225 python3[57151]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1540) Dec 3 08:42:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1535) Dec 3 08:42:58 np0005543225 python3[57184]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1530) Dec 3 08:43:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1525) Dec 3 08:43:09 np0005543225 python3[57217]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1520) Dec 3 08:43:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1515) Dec 3 08:43:19 np0005543225 python3[57250]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1510) Dec 3 08:43:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1505) Dec 3 08:43:29 np0005543225 python3[57283]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1500) Dec 3 08:43:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1495) Dec 3 08:43:40 np0005543225 python3[57316]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1490) Dec 3 08:43:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1485) Dec 3 08:43:50 np0005543225 python3[57349]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1480) Dec 3 08:43:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1475) Dec 3 08:44:00 np0005543225 python3[57382]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1470) Dec 3 08:44:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1465) Dec 3 08:44:11 np0005543225 python3[57400]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1460) Dec 3 08:44:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1455) Dec 3 08:44:21 np0005543225 python3[57431]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1450) Dec 3 08:44:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1445) Dec 3 08:44:31 np0005543225 python3[57464]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1440) Dec 3 08:44:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1435) Dec 3 08:44:42 np0005543225 python3[57497]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1430) Dec 3 08:44:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1425) Dec 3 08:44:52 np0005543225 python3[57530]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1420) Dec 3 08:44:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1415) Dec 3 08:45:02 np0005543225 python3[57563]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1410) Dec 3 08:45:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1405) Dec 3 08:45:12 np0005543225 python3[57597]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1400) Dec 3 08:45:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1395) Dec 3 08:45:23 np0005543225 python3[57630]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1390) Dec 3 08:45:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1385) Dec 3 08:45:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1380) Dec 3 08:45:33 np0005543225 python3[57663]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1375) Dec 3 08:45:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1370) Dec 3 08:45:43 np0005543225 python3[57696]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:44 np0005543225 sshd[57697]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:45:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1365) Dec 3 08:45:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1360) Dec 3 08:45:54 np0005543225 python3[57731]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1355) Dec 3 08:46:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1350) Dec 3 08:46:04 np0005543225 python3[57764]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1345) Dec 3 08:46:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1340) Dec 3 08:46:14 np0005543225 python3[57795]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1335) Dec 3 08:46:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1330) Dec 3 08:46:25 np0005543225 python3[57816]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1325) Dec 3 08:46:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1320) Dec 3 08:46:35 np0005543225 python3[57847]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1315) Dec 3 08:46:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1310) Dec 3 08:46:45 np0005543225 python3[57880]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1305) Dec 3 08:46:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1300) Dec 3 08:46:56 np0005543225 python3[57913]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1295) Dec 3 08:47:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1290) Dec 3 08:47:06 np0005543225 python3[57946]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1285) Dec 3 08:47:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1280) Dec 3 08:47:16 np0005543225 python3[57979]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1275) Dec 3 08:47:22 np0005543225 sshd[57994]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:47:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1270) Dec 3 08:47:26 np0005543225 python3[58014]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1265) Dec 3 08:47:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1260) Dec 3 08:47:37 np0005543225 python3[58047]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1255) Dec 3 08:47:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1250) Dec 3 08:47:47 np0005543225 python3[58080]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1245) Dec 3 08:47:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1240) Dec 3 08:47:57 np0005543225 python3[58113]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1235) Dec 3 08:48:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1230) Dec 3 08:48:08 np0005543225 python3[58146]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1225) Dec 3 08:48:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1220) Dec 3 08:48:18 np0005543225 python3[58176]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1215) Dec 3 08:48:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1210) Dec 3 08:48:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1205) Dec 3 08:48:28 np0005543225 python3[58200]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1200) Dec 3 08:48:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1195) Dec 3 08:48:39 np0005543225 python3[58231]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1190) Dec 3 08:48:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1185) Dec 3 08:48:49 np0005543225 python3[58261]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1180) Dec 3 08:48:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1175) Dec 3 08:48:59 np0005543225 python3[58294]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1170) Dec 3 08:49:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1165) Dec 3 08:49:09 np0005543225 python3[58327]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1160) Dec 3 08:49:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1155) Dec 3 08:49:20 np0005543225 python3[58360]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1150) Dec 3 08:49:27 np0005543225 sshd[58378]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:49:28 np0005543225 sshd[58380]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:49:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1145) Dec 3 08:49:30 np0005543225 python3[58397]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1140) Dec 3 08:49:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1135) Dec 3 08:49:40 np0005543225 python3[58430]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1130) Dec 3 08:49:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1125) Dec 3 08:49:51 np0005543225 python3[58463]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:52 np0005543225 sshd[58464]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:49:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1120) Dec 3 08:49:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1115) Dec 3 08:50:01 np0005543225 python3[58499]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1110) Dec 3 08:50:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1105) Dec 3 08:50:11 np0005543225 python3[58532]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1100) Dec 3 08:50:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1095) Dec 3 08:50:22 np0005543225 python3[58565]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1090) Dec 3 08:50:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1085) Dec 3 08:50:32 np0005543225 python3[58589]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1080) Dec 3 08:50:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1075) Dec 3 08:50:42 np0005543225 python3[58620]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1070) Dec 3 08:50:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1065) Dec 3 08:50:50 np0005543225 sshd[58633]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:50:52 np0005543225 python3[58653]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1060) Dec 3 08:50:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1055) Dec 3 08:51:03 np0005543225 python3[58683]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1050) Dec 3 08:51:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1045) Dec 3 08:51:13 np0005543225 python3[58716]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1040) Dec 3 08:51:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1035) Dec 3 08:51:19 np0005543225 sshd[58734]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:51:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1030) Dec 3 08:51:23 np0005543225 python3[58751]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1025) Dec 3 08:51:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1020) Dec 3 08:51:34 np0005543225 python3[58784]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:34 np0005543225 sshd[58785]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:51:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1015) Dec 3 08:51:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1010) Dec 3 08:51:44 np0005543225 python3[58819]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1005) Dec 3 08:51:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (1000) Dec 3 08:51:54 np0005543225 python3[58852]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (995) Dec 3 08:51:59 np0005543225 sshd[58854]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:52:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (990) Dec 3 08:52:05 np0005543225 python3[58887]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (985) Dec 3 08:52:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (980) Dec 3 08:52:15 np0005543225 python3[58920]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:18 np0005543225 sshd[58921]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:52:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (975) Dec 3 08:52:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (970) Dec 3 08:52:25 np0005543225 python3[58955]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (965) Dec 3 08:52:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (960) Dec 3 08:52:36 np0005543225 python3[58988]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:37 np0005543225 sshd[58989]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:52:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (955) Dec 3 08:52:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (950) Dec 3 08:52:46 np0005543225 python3[59019]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (945) Dec 3 08:52:51 np0005543225 sshd[59024]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:52:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (940) Dec 3 08:52:56 np0005543225 python3[59046]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (935) Dec 3 08:53:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (930) Dec 3 08:53:06 np0005543225 python3[59077]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (925) Dec 3 08:53:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (920) Dec 3 08:53:17 np0005543225 python3[59107]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (915) Dec 3 08:53:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (910) Dec 3 08:53:27 np0005543225 python3[59140]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:28 np0005543225 sshd[59141]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:53:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (905) Dec 3 08:53:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (900) Dec 3 08:53:36 np0005543225 sshd[59161]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:53:37 np0005543225 python3[59178]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (895) Dec 3 08:53:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (890) Dec 3 08:53:48 np0005543225 python3[59212]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (885) Dec 3 08:53:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (880) Dec 3 08:53:57 np0005543225 sshd[59230]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:53:58 np0005543225 python3[59247]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (875) Dec 3 08:54:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (870) Dec 3 08:54:08 np0005543225 sshd[59265]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:54:08 np0005543225 python3[59282]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:08 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (865) Dec 3 08:54:13 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (860) Dec 3 08:54:18 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (855) Dec 3 08:54:19 np0005543225 python3[59316]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:20 np0005543225 sshd[59318]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:54:23 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (850) Dec 3 08:54:28 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (845) Dec 3 08:54:29 np0005543225 python3[59352]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:33 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (840) Dec 3 08:54:38 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (835) Dec 3 08:54:39 np0005543225 sshd[59370]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:54:39 np0005543225 python3[59387]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:43 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (830) Dec 3 08:54:48 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (825) Dec 3 08:54:49 np0005543225 python3[59420]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:53 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (820) Dec 3 08:54:58 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (815) Dec 3 08:55:00 np0005543225 python3[59453]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:03 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (810) Dec 3 08:55:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (805) Dec 3 08:55:10 np0005543225 sshd[59457]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:55:10 np0005543225 python3[59476]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:11 np0005543225 sshd[59490]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:55:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (800) Dec 3 08:55:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (795) Dec 3 08:55:21 np0005543225 python3[59511]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:22 np0005543225 sshd[59523]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:55:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (790) Dec 3 08:55:28 np0005543225 sshd[59528]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:55:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (785) Dec 3 08:55:31 np0005543225 python3[59545]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (780) Dec 3 08:55:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (775) Dec 3 08:55:42 np0005543225 python3[59578]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (770) Dec 3 08:55:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (765) Dec 3 08:55:52 np0005543225 python3[59611]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (760) Dec 3 08:55:56 np0005543225 sshd[59629]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:55:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (755) Dec 3 08:56:02 np0005543225 python3[59648]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (750) Dec 3 08:56:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (745) Dec 3 08:56:12 np0005543225 python3[59681]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (740) Dec 3 08:56:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (735) Dec 3 08:56:22 np0005543225 sshd[59699]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:56:23 np0005543225 python3[59716]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (730) Dec 3 08:56:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (725) Dec 3 08:56:33 np0005543225 sshd[59750]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:56:33 np0005543225 python3[59749]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (720) Dec 3 08:56:36 np0005543225 sshd[59752]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:56:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (715) Dec 3 08:56:43 np0005543225 python3[59786]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (710) Dec 3 08:56:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (705) Dec 3 08:56:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (700) Dec 3 08:56:54 np0005543225 python3[59819]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (695) Dec 3 08:57:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (690) Dec 3 08:57:04 np0005543225 python3[59852]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (685) Dec 3 08:57:10 np0005543225 sshd[59853]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:57:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (680) Dec 3 08:57:14 np0005543225 python3[59887]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (675) Dec 3 08:57:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (670) Dec 3 08:57:25 np0005543225 python3[59910]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (665) Dec 3 08:57:32 np0005543225 sshd[59921]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:57:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (660) Dec 3 08:57:35 np0005543225 python3[59941]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (655) Dec 3 08:57:43 np0005543225 sshd[59956]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:57:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (650) Dec 3 08:57:45 np0005543225 python3[59973]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (645) Dec 3 08:57:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (640) Dec 3 08:57:55 np0005543225 python3[60006]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (635) Dec 3 08:58:03 np0005543225 sshd[60024]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:58:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (630) Dec 3 08:58:04 np0005543225 sshd[60025]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:58:06 np0005543225 python3[60042]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (625) Dec 3 08:58:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (620) Dec 3 08:58:16 np0005543225 python3[60075]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (615) Dec 3 08:58:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (610) Dec 3 08:58:26 np0005543225 python3[60108]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:27 np0005543225 sshd[60109]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:58:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (605) Dec 3 08:58:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (600) Dec 3 08:58:37 np0005543225 python3[60143]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (595) Dec 3 08:58:41 np0005543225 sshd[60144]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:58:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (590) Dec 3 08:58:47 np0005543225 python3[60178]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (585) Dec 3 08:58:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (580) Dec 3 08:58:54 np0005543225 sshd[60196]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:58:57 np0005543225 python3[60213]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (575) Dec 3 08:59:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (570) Dec 3 08:59:08 np0005543225 python3[60246]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (565) Dec 3 08:59:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (560) Dec 3 08:59:18 np0005543225 python3[60279]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (555) Dec 3 08:59:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (550) Dec 3 08:59:28 np0005543225 python3[60312]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (545) Dec 3 08:59:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (540) Dec 3 08:59:35 np0005543225 sshd[60313]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:59:39 np0005543225 python3[60337]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (535) Dec 3 08:59:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (530) Dec 3 08:59:46 np0005543225 sshd[60348]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:59:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (525) Dec 3 08:59:49 np0005543225 python3[60368]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (520) Dec 3 08:59:54 np0005543225 sshd[60383]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:59:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (515) Dec 3 08:59:59 np0005543225 python3[60400]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (510) Dec 3 09:00:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (505) Dec 3 09:00:09 np0005543225 python3[60434]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:11 np0005543225 sshd[60440]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:00:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (500) Dec 3 09:00:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (495) Dec 3 09:00:20 np0005543225 python3[60469]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (490) Dec 3 09:00:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (485) Dec 3 09:00:30 np0005543225 python3[60502]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (480) Dec 3 09:00:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (475) Dec 3 09:00:40 np0005543225 python3[60535]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (470) Dec 3 09:00:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (465) Dec 3 09:00:51 np0005543225 python3[60568]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (460) Dec 3 09:00:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (455) Dec 3 09:01:01 np0005543225 python3[60601]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (450) Dec 3 09:01:06 np0005543225 sshd[60613]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:01:07 np0005543225 sshd[60623]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:01:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (445) Dec 3 09:01:11 np0005543225 python3[60650]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (440) Dec 3 09:01:15 np0005543225 sshd[60651]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:01:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (435) Dec 3 09:01:22 np0005543225 python3[60686]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (430) Dec 3 09:01:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (425) Dec 3 09:01:32 np0005543225 python3[60720]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (420) Dec 3 09:01:36 np0005543225 sshd[60721]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:01:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (415) Dec 3 09:01:42 np0005543225 python3[60756]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (410) Dec 3 09:01:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (405) Dec 3 09:01:53 np0005543225 python3[60789]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (400) Dec 3 09:01:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (395) Dec 3 09:02:03 np0005543225 python3[60808]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (390) Dec 3 09:02:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (385) Dec 3 09:02:13 np0005543225 python3[60838]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (380) Dec 3 09:02:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (375) Dec 3 09:02:23 np0005543225 python3[60871]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (370) Dec 3 09:02:28 np0005543225 sshd[60889]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:02:28 np0005543225 sshd[60891]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:02:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (365) Dec 3 09:02:34 np0005543225 python3[60909]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (360) Dec 3 09:02:38 np0005543225 sshd[60927]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:02:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (355) Dec 3 09:02:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (350) Dec 3 09:02:44 np0005543225 python3[60944]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (345) Dec 3 09:02:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (340) Dec 3 09:02:54 np0005543225 python3[60977]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (335) Dec 3 09:03:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (330) Dec 3 09:03:05 np0005543225 python3[61010]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:05 np0005543225 sshd[61011]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:03:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (325) Dec 3 09:03:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (320) Dec 3 09:03:15 np0005543225 python3[61045]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (315) Dec 3 09:03:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (310) Dec 3 09:03:25 np0005543225 python3[61078]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (305) Dec 3 09:03:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (300) Dec 3 09:03:36 np0005543225 python3[61111]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (295) Dec 3 09:03:39 np0005543225 sshd[61112]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:03:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (290) Dec 3 09:03:46 np0005543225 python3[61146]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:48 np0005543225 sshd[61147]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:03:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (285) Dec 3 09:03:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (280) Dec 3 09:03:56 np0005543225 python3[61181]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (275) Dec 3 09:04:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (270) Dec 3 09:04:07 np0005543225 python3[61214]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (265) Dec 3 09:04:11 np0005543225 sshd[61215]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:04:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (260) Dec 3 09:04:17 np0005543225 python3[61238]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (255) Dec 3 09:04:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (250) Dec 3 09:04:27 np0005543225 python3[61267]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (245) Dec 3 09:04:33 np0005543225 sshd[61285]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:04:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (240) Dec 3 09:04:37 np0005543225 python3[61302]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (235) Dec 3 09:04:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (230) Dec 3 09:04:48 np0005543225 python3[61335]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (225) Dec 3 09:04:52 np0005543225 sshd[61353]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:04:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (220) Dec 3 09:04:58 np0005543225 python3[61370]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (215) Dec 3 09:05:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (210) Dec 3 09:05:08 np0005543225 python3[61403]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:09 np0005543225 sshd[61404]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:05:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (205) Dec 3 09:05:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (200) Dec 3 09:05:19 np0005543225 python3[61438]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (195) Dec 3 09:05:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (190) Dec 3 09:05:29 np0005543225 python3[61471]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (185) Dec 3 09:05:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (180) Dec 3 09:05:37 np0005543225 sshd[61489]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:05:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (175) Dec 3 09:05:39 np0005543225 python3[61506]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:43 np0005543225 sshd[61507]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:05:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (170) Dec 3 09:05:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (165) Dec 3 09:05:50 np0005543225 python3[61541]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (160) Dec 3 09:05:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (155) Dec 3 09:06:00 np0005543225 python3[61574]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:03 np0005543225 sshd[61575]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:06:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (150) Dec 3 09:06:08 np0005543225 sshd[61583]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:06:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (145) Dec 3 09:06:10 np0005543225 python3[61613]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (140) Dec 3 09:06:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (135) Dec 3 09:06:21 np0005543225 python3[61646]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (130) Dec 3 09:06:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (125) Dec 3 09:06:31 np0005543225 python3[61667]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (120) Dec 3 09:06:36 np0005543225 sshd[61680]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:06:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (115) Dec 3 09:06:41 np0005543225 python3[61697]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (110) Dec 3 09:06:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (105) Dec 3 09:06:51 np0005543225 python3[61730]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (100) Dec 3 09:06:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (95) Dec 3 09:07:02 np0005543225 python3[61764]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:03 np0005543225 sshd[61765]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:07:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (90) Dec 3 09:07:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (85) Dec 3 09:07:12 np0005543225 python3[61799]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (80) Dec 3 09:07:18 np0005543225 sshd[61817]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:07:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (75) Dec 3 09:07:22 np0005543225 python3[61834]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (70) Dec 3 09:07:26 np0005543225 sshd[61835]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:07:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (65) Dec 3 09:07:33 np0005543225 python3[61869]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:34 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (60) Dec 3 09:07:35 np0005543225 sshd[61870]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:07:39 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (55) Dec 3 09:07:43 np0005543225 python3[61905]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:44 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (50) Dec 3 09:07:49 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (45) Dec 3 09:07:53 np0005543225 python3[61938]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:54 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (40) Dec 3 09:07:59 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (35) Dec 3 09:08:00 np0005543225 sshd[61942]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:08:03 np0005543225 python3[61974]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:04 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (30) Dec 3 09:08:09 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (25) Dec 3 09:08:10 np0005543225 sshd[61975]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:08:14 np0005543225 python3[62009]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:14 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (20) Dec 3 09:08:19 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (15) Dec 3 09:08:24 np0005543225 python3[62042]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:24 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (10) Dec 3 09:08:29 np0005543225 ansible-async_wrapper.py[48193]: 48194 still running (5) Dec 3 09:08:34 np0005543225 python3[62065]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:34 np0005543225 ansible-async_wrapper.py[48193]: Timeout reached, now killing 48194 Dec 3 09:08:34 np0005543225 ansible-async_wrapper.py[48193]: Sent kill to group 48194 Dec 3 09:08:39 np0005543225 sshd[62076]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:08:45 np0005543225 python3[62093]: ansible-ansible.legacy.async_status Invoked with jid=817977229739.48190 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:45 np0005543225 python3[62109]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 09:08:46 np0005543225 python3[62125]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:08:46 np0005543225 python3[62173]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:08:47 np0005543225 python3[62216]: ansible-ansible.legacy.copy Invoked with dest=/var/lib/container-puppet/puppetlabs/facter.conf setype=svirt_sandbox_file_t selevel=s0 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752926.3982828-173520-266894228276585/source _original_basename=tmp8stwr_gv follow=False checksum=53908622cb869db5e2e2a68e737aa2ab1a872111 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 09:08:47 np0005543225 python3[62246]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:08:48 np0005543225 python3[62350]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Dec 3 09:08:49 np0005543225 python3[62369]: ansible-file Invoked with path=/var/lib/tripleo-config/container-puppet-config mode=448 recurse=True setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False state=None _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 09:08:49 np0005543225 python3[62385]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=False puppet_config=/var/lib/container-puppet/container-puppet.json short_hostname=np0005543225 step=1 update_config_hash_only=False Dec 3 09:08:50 np0005543225 python3[62401]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:08:50 np0005543225 sshd[62402]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:08:50 np0005543225 python3[62419]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Dec 3 09:08:50 np0005543225 systemd-journald[617]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 75.4 (251 of 333 items), suggesting rotation. Dec 3 09:08:50 np0005543225 systemd-journald[617]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 09:08:50 np0005543225 rsyslogd[47999]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 09:08:50 np0005543225 rsyslogd[47999]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 09:08:51 np0005543225 python3[62436]: ansible-containers.podman.podman_container_info Invoked with executable=podman name=None Dec 3 09:08:51 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:08:52 np0005543225 python3[62463]: ansible-tripleo_container_manage Invoked with config_id=tripleo_puppet_step1 config_dir=/var/lib/tripleo-config/container-puppet-config/step_1 config_patterns=container-puppet-*.json config_overrides={} concurrency=6 log_base_path=/var/log/containers/stdouts debug=False Dec 3 09:08:52 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:08:52 np0005543225 podman[62673]: 2025-12-03 09:08:52.519876258 +0000 UTC m=+0.077255581 container create f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, name=rhosp17/openstack-ceilometer-central, container_name=container-puppet-ceilometer, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, io.buildah.version=1.41.4, managed_by=tripleo_ansible, vendor=Red Hat, Inc., com.redhat.component=openstack-ceilometer-central-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2025-11-19T00:11:59Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, tcib_managed=true, version=17.1.12, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, maintainer=OpenStack TripleO Team, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central) Dec 3 09:08:52 np0005543225 podman[62654]: 2025-12-03 09:08:52.525684282 +0000 UTC m=+0.111065468 container create 638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, release=1761123044, summary=Red Hat OpenStack Platform 17.1 mariadb, container_name=container-puppet-clustercheck, url=https://www.redhat.com, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-mariadb-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-type=git, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.expose-services=, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, version=17.1.12, build-date=2025-11-18T22:51:13Z, description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb) Dec 3 09:08:52 np0005543225 podman[62676]: 2025-12-03 09:08:52.552547655 +0000 UTC m=+0.102464410 container create f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, release=1761123044, build-date=2025-11-18T23:45:01Z, name=rhosp17/openstack-glance-api, distribution-scope=public, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.12, io.buildah.version=1.41.4, managed_by=tripleo_ansible, com.redhat.component=openstack-glance-api-container, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_id=tripleo_puppet_step1, vcs-type=git, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-glance_api_internal, summary=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64) Dec 3 09:08:52 np0005543225 podman[62685]: 2025-12-03 09:08:52.565023876 +0000 UTC m=+0.101653518 container create 54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, build-date=2025-11-18T22:51:28Z, io.openshift.expose-services=, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, release=1761123044, distribution-scope=public, name=rhosp17/openstack-collectd, maintainer=OpenStack TripleO Team, tcib_managed=true, container_name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, com.redhat.component=openstack-collectd-container, summary=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible) Dec 3 09:08:52 np0005543225 podman[62654]: 2025-12-03 09:08:52.474846324 +0000 UTC m=+0.060227530 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:08:52 np0005543225 systemd[1]: Created slice Slice /machine. Dec 3 09:08:52 np0005543225 systemd[1]: Started libpod-conmon-638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59.scope. Dec 3 09:08:52 np0005543225 podman[62673]: 2025-12-03 09:08:52.476004604 +0000 UTC m=+0.033383947 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Dec 3 09:08:52 np0005543225 podman[62676]: 2025-12-03 09:08:52.486941194 +0000 UTC m=+0.036857949 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 09:08:52 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:52 np0005543225 podman[62684]: 2025-12-03 09:08:52.4924245 +0000 UTC m=+0.035913704 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 09:08:52 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/8ccc4b9492df9707d5bc3271c646f94f24bebc5acb1c37a6e9e30e21e1a13488/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:52 np0005543225 systemd[1]: Started libpod-conmon-54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99.scope. Dec 3 09:08:52 np0005543225 podman[62700]: 2025-12-03 09:08:52.610355218 +0000 UTC m=+0.139392609 container create e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, tcib_managed=true, build-date=2025-11-19T00:20:06Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, distribution-scope=public, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, release=1761123044, url=https://www.redhat.com, container_name=container-puppet-cinder, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.component=openstack-cinder-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711) Dec 3 09:08:52 np0005543225 podman[62685]: 2025-12-03 09:08:52.514716711 +0000 UTC m=+0.051346373 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Dec 3 09:08:52 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:52 np0005543225 podman[62684]: 2025-12-03 09:08:52.629170578 +0000 UTC m=+0.172659762 container create a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 glance-api, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, name=rhosp17/openstack-glance-api, distribution-scope=public, container_name=container-puppet-glance_api, com.redhat.component=openstack-glance-api-container, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64, io.openshift.expose-services=, version=17.1.12, build-date=2025-11-18T23:45:01Z, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, io.buildah.version=1.41.4, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20251118.1, vendor=Red Hat, Inc.) Dec 3 09:08:52 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a6ebb4022c382c281394ece85c6657443abbf774da0634e48e9674a616e6c743/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:52 np0005543225 systemd[1]: Started libpod-conmon-e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0.scope. Dec 3 09:08:52 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:52 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b2a7679fe7e5382e32be037f3f0f909cbc531cc6863fb357d99ac0f5240f2307/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:52 np0005543225 systemd[1]: Started libpod-conmon-a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b.scope. Dec 3 09:08:52 np0005543225 podman[62700]: 2025-12-03 09:08:52.652310432 +0000 UTC m=+0.181347823 container init e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, batch=17.1_20251118.1, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-cinder-api-container, vcs-type=git, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vendor=Red Hat, Inc., io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, build-date=2025-11-19T00:20:06Z, description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, config_id=tripleo_puppet_step1, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, container_name=container-puppet-cinder, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, version=17.1.12) Dec 3 09:08:52 np0005543225 podman[62685]: 2025-12-03 09:08:52.659061661 +0000 UTC m=+0.195691303 container init 54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, tcib_managed=true, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-collectd, io.openshift.expose-services=, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, distribution-scope=public, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, build-date=2025-11-18T22:51:28Z, com.redhat.component=openstack-collectd-container, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-collectd, maintainer=OpenStack TripleO Team) Dec 3 09:08:52 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:52 np0005543225 podman[62685]: 2025-12-03 09:08:52.668020249 +0000 UTC m=+0.204649891 container start 54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, maintainer=OpenStack TripleO Team, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, container_name=container-puppet-collectd, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, name=rhosp17/openstack-collectd, release=1761123044, batch=17.1_20251118.1, io.buildah.version=1.41.4, architecture=x86_64, io.openshift.expose-services=, version=17.1.12, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:51:28Z) Dec 3 09:08:52 np0005543225 podman[62685]: 2025-12-03 09:08:52.668667486 +0000 UTC m=+0.205297168 container attach 54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, release=1761123044, config_id=tripleo_puppet_step1, com.redhat.component=openstack-collectd-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:51:28Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, distribution-scope=public, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, tcib_managed=true, architecture=x86_64, vcs-type=git, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, container_name=container-puppet-collectd, description=Red Hat OpenStack Platform 17.1 collectd, summary=Red Hat OpenStack Platform 17.1 collectd, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, version=17.1.12) Dec 3 09:08:52 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e0de8ea8501a73fc3e07925a1abf006a380f8633ef2050e372028512ee99f90b/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:52 np0005543225 podman[62700]: 2025-12-03 09:08:52.57460332 +0000 UTC m=+0.103640771 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Dec 3 09:08:52 np0005543225 systemd[1]: Started libpod-conmon-f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707.scope. Dec 3 09:08:52 np0005543225 podman[62700]: 2025-12-03 09:08:52.711512852 +0000 UTC m=+0.240550273 container start e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-cinder, description=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, com.redhat.component=openstack-cinder-api-container, summary=Red Hat OpenStack Platform 17.1 cinder-api, version=17.1.12, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, name=rhosp17/openstack-cinder-api, build-date=2025-11-19T00:20:06Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., io.buildah.version=1.41.4, vcs-type=git, distribution-scope=public, tcib_managed=true, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711) Dec 3 09:08:52 np0005543225 podman[62700]: 2025-12-03 09:08:52.711876412 +0000 UTC m=+0.240913843 container attach e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, build-date=2025-11-19T00:20:06Z, architecture=x86_64, com.redhat.component=openstack-cinder-api-container, summary=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, vendor=Red Hat, Inc., io.openshift.expose-services=, distribution-scope=public, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, name=rhosp17/openstack-cinder-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, release=1761123044, batch=17.1_20251118.1, container_name=container-puppet-cinder, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, io.buildah.version=1.41.4, version=17.1.12) Dec 3 09:08:52 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:52 np0005543225 podman[62654]: 2025-12-03 09:08:52.719517415 +0000 UTC m=+0.304898611 container init 638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, io.openshift.expose-services=, com.redhat.component=openstack-mariadb-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, architecture=x86_64, release=1761123044, summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:51:13Z, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, vendor=Red Hat, Inc., vcs-type=git, batch=17.1_20251118.1, container_name=container-puppet-clustercheck, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:08:52 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0c0ae4cbd75d15655d98fddf1973e7a05461a3fea7fb25a6282cc34ef8c415f2/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:52 np0005543225 podman[62654]: 2025-12-03 09:08:52.731458292 +0000 UTC m=+0.316839498 container start 638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-mariadb, version=17.1.12, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:51:13Z, tcib_managed=true, url=https://www.redhat.com, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, maintainer=OpenStack TripleO Team, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-clustercheck, vendor=Red Hat, Inc., org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git) Dec 3 09:08:52 np0005543225 podman[62654]: 2025-12-03 09:08:52.731871943 +0000 UTC m=+0.317253149 container attach 638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, architecture=x86_64, release=1761123044, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-mariadb, vendor=Red Hat, Inc., container_name=container-puppet-clustercheck) Dec 3 09:08:52 np0005543225 podman[62684]: 2025-12-03 09:08:52.782504977 +0000 UTC m=+0.325994171 container init a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, summary=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, build-date=2025-11-18T23:45:01Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-glance-api, batch=17.1_20251118.1, distribution-scope=public, container_name=container-puppet-glance_api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, vendor=Red Hat, Inc.) Dec 3 09:08:52 np0005543225 podman[62684]: 2025-12-03 09:08:52.791453544 +0000 UTC m=+0.334942788 container start a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, url=https://www.redhat.com, name=rhosp17/openstack-glance-api, vendor=Red Hat, Inc., architecture=x86_64, maintainer=OpenStack TripleO Team, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, build-date=2025-11-18T23:45:01Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.12, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-glance_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vcs-type=git) Dec 3 09:08:52 np0005543225 podman[62684]: 2025-12-03 09:08:52.792367948 +0000 UTC m=+0.335857172 container attach a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, managed_by=tripleo_ansible, architecture=x86_64, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, build-date=2025-11-18T23:45:01Z, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, distribution-scope=public, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-glance_api, io.buildah.version=1.41.4, version=17.1.12, description=Red Hat OpenStack Platform 17.1 glance-api, tcib_managed=true, url=https://www.redhat.com, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-glance-api, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-glance-api-container, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:08:52 np0005543225 systemd[1]: Started libpod-conmon-f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42.scope. Dec 3 09:08:52 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:52 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/27732e52ee4e69ac63f5cce64d0ca5225914b2134f6617c28d17012fa5006aef/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:52 np0005543225 podman[62676]: 2025-12-03 09:08:52.821714677 +0000 UTC m=+0.371631472 container init f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, io.openshift.expose-services=, config_id=tripleo_puppet_step1, container_name=container-puppet-glance_api_internal, io.buildah.version=1.41.4, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, build-date=2025-11-18T23:45:01Z, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp17/openstack-glance-api, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, maintainer=OpenStack TripleO Team, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d) Dec 3 09:08:52 np0005543225 podman[62676]: 2025-12-03 09:08:52.832553115 +0000 UTC m=+0.382469900 container start f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, com.redhat.component=openstack-glance-api-container, name=rhosp17/openstack-glance-api, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, build-date=2025-11-18T23:45:01Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, vendor=Red Hat, Inc., url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-glance_api_internal, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api) Dec 3 09:08:52 np0005543225 podman[62676]: 2025-12-03 09:08:52.832812081 +0000 UTC m=+0.382728866 container attach f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, config_id=tripleo_puppet_step1, version=17.1.12, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, build-date=2025-11-18T23:45:01Z, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp17/openstack-glance-api, distribution-scope=public, maintainer=OpenStack TripleO Team, container_name=container-puppet-glance_api_internal, com.redhat.component=openstack-glance-api-container, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, url=https://www.redhat.com, vcs-type=git, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api) Dec 3 09:08:52 np0005543225 podman[62673]: 2025-12-03 09:08:52.883461545 +0000 UTC m=+0.440840898 container init f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, io.buildah.version=1.41.4, version=17.1.12, batch=17.1_20251118.1, name=rhosp17/openstack-ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, vcs-type=git, maintainer=OpenStack TripleO Team, release=1761123044, io.openshift.expose-services=, managed_by=tripleo_ansible, build-date=2025-11-19T00:11:59Z, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-ceilometer-central-container, distribution-scope=public, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-ceilometer, config_id=tripleo_puppet_step1, architecture=x86_64) Dec 3 09:08:52 np0005543225 podman[62673]: 2025-12-03 09:08:52.892067414 +0000 UTC m=+0.449446767 container start f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, com.redhat.component=openstack-ceilometer-central-container, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-19T00:11:59Z, vendor=Red Hat, Inc., architecture=x86_64, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, name=rhosp17/openstack-ceilometer-central, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_puppet_step1, url=https://www.redhat.com, io.openshift.expose-services=, version=17.1.12, container_name=container-puppet-ceilometer, release=1761123044, tcib_managed=true) Dec 3 09:08:52 np0005543225 podman[62673]: 2025-12-03 09:08:52.892645559 +0000 UTC m=+0.450024902 container attach f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.openshift.expose-services=, vendor=Red Hat, Inc., distribution-scope=public, release=1761123044, description=Red Hat OpenStack Platform 17.1 ceilometer-central, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-ceilometer-central-container, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, tcib_managed=true, config_id=tripleo_puppet_step1, name=rhosp17/openstack-ceilometer-central, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, vcs-type=git, build-date=2025-11-19T00:11:59Z, io.buildah.version=1.41.4, managed_by=tripleo_ansible, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, container_name=container-puppet-ceilometer, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central) Dec 3 09:08:54 np0005543225 puppet-user[62789]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:54 np0005543225 puppet-user[62789]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:54 np0005543225 puppet-user[62789]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:54 np0005543225 puppet-user[62789]: (file & line not available) Dec 3 09:08:54 np0005543225 puppet-user[62789]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:54 np0005543225 puppet-user[62789]: (file & line not available) Dec 3 09:08:54 np0005543225 puppet-user[62789]: Warning: Scope(Class[Tripleo::Profile::Base::Cinder::Api]): The keymgr_backend parameter has been deprecated and has no effect. Dec 3 09:08:54 np0005543225 puppet-user[62787]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:54 np0005543225 puppet-user[62787]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:54 np0005543225 puppet-user[62787]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:54 np0005543225 puppet-user[62787]: (file & line not available) Dec 3 09:08:54 np0005543225 puppet-user[62787]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:54 np0005543225 puppet-user[62787]: (file & line not available) Dec 3 09:08:54 np0005543225 puppet-user[62789]: Warning: Scope(Class[Cinder]): The database_connection parameter is deprecated and will be \ Dec 3 09:08:54 np0005543225 puppet-user[62789]: removed in a future realse. Use cinder::db::database_connection instead Dec 3 09:08:54 np0005543225 puppet-user[62789]: Warning: Unknown variable: 'cinder::api::keymgr_backend'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 455, column: 31) Dec 3 09:08:54 np0005543225 puppet-user[62789]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_api_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 456, column: 42) Dec 3 09:08:54 np0005543225 puppet-user[62789]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_auth_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 458, column: 43) Dec 3 09:08:54 np0005543225 puppet-user[62840]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:54 np0005543225 puppet-user[62840]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:54 np0005543225 puppet-user[62840]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:54 np0005543225 puppet-user[62840]: (file & line not available) Dec 3 09:08:54 np0005543225 puppet-user[62827]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:54 np0005543225 puppet-user[62827]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:54 np0005543225 puppet-user[62827]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:54 np0005543225 puppet-user[62827]: (file & line not available) Dec 3 09:08:55 np0005543225 puppet-user[62840]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:55 np0005543225 puppet-user[62840]: (file & line not available) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:55 np0005543225 puppet-user[62854]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:55 np0005543225 puppet-user[62854]: (file & line not available) Dec 3 09:08:55 np0005543225 puppet-user[62827]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:55 np0005543225 puppet-user[62827]: (file & line not available) Dec 3 09:08:55 np0005543225 puppet-user[62807]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:55 np0005543225 puppet-user[62807]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:55 np0005543225 puppet-user[62807]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:55 np0005543225 puppet-user[62807]: (file & line not available) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:55 np0005543225 puppet-user[62854]: (file & line not available) Dec 3 09:08:55 np0005543225 puppet-user[62807]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:55 np0005543225 puppet-user[62807]: (file & line not available) Dec 3 09:08:55 np0005543225 puppet-user[62807]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.08 seconds Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.43 seconds Dec 3 09:08:55 np0005543225 puppet-user[62807]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}f478e1cfe0b558ac9d6fd8695332947dac66084bba20f3182fc0dfd9958bd118' Dec 3 09:08:55 np0005543225 puppet-user[62807]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.d]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62807]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.conf]/ensure: defined content as '{sha256}37f48d3e5dce056a46519d144042a388bde95ea9fa161d3362eedf70e7987a91' Dec 3 09:08:55 np0005543225 puppet-user[62807]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/Xinetd::Service[galera-monitor]/File[/etc/xinetd.d/galera-monitor]/ensure: defined content as '{sha256}12cc149b1535ff786e74f5a3f77b63d2aab2cf3d4d0d8c22b3f2d0b949a4c84b' Dec 3 09:08:55 np0005543225 puppet-user[62807]: Notice: Applied catalog in 0.03 seconds Dec 3 09:08:55 np0005543225 puppet-user[62807]: Application: Dec 3 09:08:55 np0005543225 puppet-user[62807]: Initial environment: production Dec 3 09:08:55 np0005543225 puppet-user[62807]: Converged environment: production Dec 3 09:08:55 np0005543225 puppet-user[62807]: Run mode: user Dec 3 09:08:55 np0005543225 puppet-user[62807]: Changes: Dec 3 09:08:55 np0005543225 puppet-user[62807]: Total: 4 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Events: Dec 3 09:08:55 np0005543225 puppet-user[62807]: Success: 4 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Total: 4 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Resources: Dec 3 09:08:55 np0005543225 puppet-user[62807]: Changed: 4 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Out of sync: 4 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Skipped: 9 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Total: 13 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Time: Dec 3 09:08:55 np0005543225 puppet-user[62807]: File: 0.01 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Transaction evaluation: 0.02 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Catalog application: 0.03 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Config retrieval: 0.10 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Last run: 1764752935 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Total: 0.03 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Version: Dec 3 09:08:55 np0005543225 puppet-user[62807]: Config: 1764752935 Dec 3 09:08:55 np0005543225 puppet-user[62807]: Puppet: 7.10.0 Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::cache_backend'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 145, column: 39) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::memcache_servers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 146, column: 39) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::cache_tls_enabled'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 147, column: 39) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::cache_tls_cafile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 148, column: 39) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::cache_tls_certfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 149, column: 39) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::cache_tls_keyfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 150, column: 39) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::cache_tls_allowed_ciphers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 151, column: 39) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::manage_backend_package'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 152, column: 39) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_password'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 63, column: 25) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_url'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 68, column: 25) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_region'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 69, column: 28) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 70, column: 25) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_tenant_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 71, column: 29) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_cacert'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 72, column: 23) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_endpoint_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 73, column: 26) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 74, column: 33) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_project_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 75, column: 36) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 76, column: 26) Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/content: content changed '{sha256}aea388a73ebafc7e07a81ddb930a91099211f660eee55fbf92c13007a77501e5' to '{sha256}2523d01ee9c3022c0e9f61d896b1474a168e18472aee141cc278e69fe13f41c1' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/owner: owner changed 'collectd' to 'root' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/group: group changed 'collectd' to 'root' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/mode: mode changed '0644' to '0640' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/owner: owner changed 'collectd' to 'root' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/group: group changed 'collectd' to 'root' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/mode: mode changed '0755' to '0750' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-cpu.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-interface.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-load.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-memory.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-syslog.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/apache.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/dns.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ipmi.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mcelog.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mysql.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-events.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-stats.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ping.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/pmu.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/rdt.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/sensors.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/snmp.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/virt.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/write_prometheus.conf]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Python/File[/usr/lib/python3.9/site-packages]/mode: mode changed '0755' to '0750' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Python/Collectd::Plugin[python]/File[python.load]/ensure: defined content as '{sha256}0163924a0099dd43fe39cb85e836df147fd2cfee8197dc6866d3c384539eb6ee' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Python/Concat[/etc/collectd.d/python-config.conf]/File[/etc/collectd.d/python-config.conf]/ensure: defined content as '{sha256}2e5fb20e60b30f84687fc456a37fc62451000d2d85f5bbc1b3fca3a5eac9deeb' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Logfile/Collectd::Plugin[logfile]/File[logfile.load]/ensure: defined content as '{sha256}07bbda08ef9b824089500bdc6ac5a86e7d1ef2ae3ed4ed423c0559fe6361e5af' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Amqp1/Collectd::Plugin[amqp1]/File[amqp1.load]/ensure: defined content as '{sha256}5f4ef999e2aa74bccc3d619d9edb41fd0a9182d363770d07d1442f9f4950bb37' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Cpu/Collectd::Plugin[cpu]/File[cpu.load]/ensure: defined content as '{sha256}67d4c8bf6bf5785f4cb6b596712204d9eacbcebbf16fe289907195d4d3cb0e34' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Df/Collectd::Plugin[df]/File[df.load]/ensure: defined content as '{sha256}edeb4716d96fc9dca2c6adfe07bae70ba08c6af3944a3900581cba0f08f3c4ba' Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.45 seconds Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Disk/Collectd::Plugin[disk]/File[disk.load]/ensure: defined content as '{sha256}1d0cb838278f3226fcd381f0fc2e0e1abaf0d590f4ba7bcb2fc6ec113d3ebde7' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[hugepages.load]/ensure: defined content as '{sha256}9b9f35b65a73da8d4037e4355a23b678f2cf61997ccf7a5e1adf2a7ce6415827' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[older_hugepages.load]/ensure: removed Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Interface/Collectd::Plugin[interface]/File[interface.load]/ensure: defined content as '{sha256}b76b315dc312e398940fe029c6dbc5c18d2b974ff7527469fc7d3617b5222046' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Load/Collectd::Plugin[load]/File[load.load]/ensure: defined content as '{sha256}af2403f76aebd2f10202d66d2d55e1a8d987eed09ced5a3e3873a4093585dc31' Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Memory/Collectd::Plugin[memory]/File[memory.load]/ensure: defined content as '{sha256}0f270425ee6b05fc9440ee32b9afd1010dcbddd9b04ca78ff693858f7ecb9d0e' Dec 3 09:08:55 np0005543225 systemd[1]: libpod-638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59.scope: Deactivated successfully. Dec 3 09:08:55 np0005543225 systemd[1]: libpod-638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59.scope: Consumed 2.683s CPU time. Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Unixsock/Collectd::Plugin[unixsock]/File[unixsock.load]/ensure: defined content as '{sha256}9d1ec1c51ba386baa6f62d2e019dbd6998ad924bf868b3edc2d24d3dc3c63885' Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/http_timeout]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/host]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[publisher/telemetry_secret]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_name]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_password]/ensure: created Dec 3 09:08:55 np0005543225 podman[62654]: 2025-12-03 09:08:55.558645294 +0000 UTC m=+3.144026530 container died 638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, io.openshift.expose-services=, vcs-type=git, architecture=x86_64, url=https://www.redhat.com, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, name=rhosp17/openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-clustercheck, config_id=tripleo_puppet_step1, tcib_managed=true) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_url]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/region_name]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/username]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Uptime/Collectd::Plugin[uptime]/File[uptime.load]/ensure: defined content as '{sha256}f7a26c6369f904d0ca1af59627ebea15f5e72160bcacdf08d217af282b42e5c0' Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/password]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_name]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/interface]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: /Stage[main]/Collectd::Plugin::Memcached/Collectd::Plugin[memcached]/File[memcached.load]/ensure: defined content as '{sha256}2d19414f7d47e6189605e281b1d510f099947f4219b22e2d001127954658b68c' Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/user_domain_name]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_domain_name]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_type]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62787]: Notice: Applied catalog in 0.42 seconds Dec 3 09:08:55 np0005543225 puppet-user[62787]: Application: Dec 3 09:08:55 np0005543225 puppet-user[62787]: Initial environment: production Dec 3 09:08:55 np0005543225 puppet-user[62787]: Converged environment: production Dec 3 09:08:55 np0005543225 puppet-user[62787]: Run mode: user Dec 3 09:08:55 np0005543225 puppet-user[62787]: Changes: Dec 3 09:08:55 np0005543225 puppet-user[62787]: Total: 42 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Events: Dec 3 09:08:55 np0005543225 puppet-user[62787]: Success: 42 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Total: 42 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Resources: Dec 3 09:08:55 np0005543225 puppet-user[62787]: Skipped: 12 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Changed: 37 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Out of sync: 37 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Total: 77 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Time: Dec 3 09:08:55 np0005543225 puppet-user[62787]: Concat file: 0.00 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Concat fragment: 0.00 Dec 3 09:08:55 np0005543225 puppet-user[62787]: File: 0.21 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Transaction evaluation: 0.40 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Catalog application: 0.42 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Config retrieval: 0.52 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Last run: 1764752935 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Total: 0.42 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Version: Dec 3 09:08:55 np0005543225 puppet-user[62787]: Config: 1764752934 Dec 3 09:08:55 np0005543225 puppet-user[62787]: Puppet: 7.10.0 Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[DEFAULT/polling_namespaces]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62789]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/backup.pp, line: 94, column: 18) Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[polling/tenant_name_discovery]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[coordination/backend_url]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Agent::Notification/File[event_pipeline]/ensure: defined content as '{sha256}97b000582d6be7fd4e80bc1fc15bc0358888fdea71d4447491d8c683cd09e21b' Dec 3 09:08:55 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:55 np0005543225 systemd[1]: var-lib-containers-storage-overlay-8ccc4b9492df9707d5bc3271c646f94f24bebc5acb1c37a6e9e30e21e1a13488-merged.mount: Deactivated successfully. Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/backend]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/enabled]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/memcache_servers]/ensure: created Dec 3 09:08:55 np0005543225 podman[63300]: 2025-12-03 09:08:55.70547445 +0000 UTC m=+0.131298455 container cleanup 638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, name=rhosp17/openstack-mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, vcs-type=git, distribution-scope=public, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, vendor=Red Hat, Inc., release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-clustercheck, batch=17.1_20251118.1, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4) Dec 3 09:08:55 np0005543225 systemd[1]: libpod-conmon-638610c06904487048a4d9ca9ed760089a9e59c81f0c6414513fed8bb9409a59.scope: Deactivated successfully. Dec 3 09:08:55 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-clustercheck --conmon-pidfile /run/container-puppet-clustercheck.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=clustercheck --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::pacemaker::clustercheck --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-clustercheck --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-clustercheck.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/tls_enabled]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62789]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/volume.pp, line: 69, column: 18) Dec 3 09:08:55 np0005543225 puppet-user[62840]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Dec 3 09:08:55 np0005543225 puppet-user[62840]: glance::backend::multistore::cinder::cinder_os_region_name instead. Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Rabbit[ceilometer_config]/Ceilometer_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62840]: Warning: Scope(Class[Glance::Api]): The show_multiple_locations parameter is deprecated, and will be removed in a future release Dec 3 09:08:55 np0005543225 puppet-user[62827]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Dec 3 09:08:55 np0005543225 puppet-user[62827]: glance::backend::multistore::cinder::cinder_os_region_name instead. Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/rpc_address_prefix]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/notify_address_prefix]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/topics]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Default[ceilometer_config]/Ceilometer_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/debug]/ensure: created Dec 3 09:08:55 np0005543225 puppet-user[62854]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:56 np0005543225 puppet-user[62854]: Notice: Applied catalog in 0.52 seconds Dec 3 09:08:56 np0005543225 puppet-user[62854]: Application: Dec 3 09:08:56 np0005543225 puppet-user[62854]: Initial environment: production Dec 3 09:08:56 np0005543225 puppet-user[62854]: Converged environment: production Dec 3 09:08:56 np0005543225 puppet-user[62854]: Run mode: user Dec 3 09:08:56 np0005543225 puppet-user[62854]: Changes: Dec 3 09:08:56 np0005543225 puppet-user[62854]: Total: 31 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Events: Dec 3 09:08:56 np0005543225 puppet-user[62854]: Success: 31 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Total: 31 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Resources: Dec 3 09:08:56 np0005543225 puppet-user[62854]: Skipped: 24 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Changed: 31 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Out of sync: 31 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Total: 157 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Time: Dec 3 09:08:56 np0005543225 puppet-user[62854]: File: 0.00 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Ceilometer config: 0.45 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Transaction evaluation: 0.51 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Catalog application: 0.52 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Config retrieval: 0.52 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Last run: 1764752936 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Resources: 0.00 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Total: 0.52 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Version: Dec 3 09:08:56 np0005543225 puppet-user[62854]: Config: 1764752934 Dec 3 09:08:56 np0005543225 puppet-user[62854]: Puppet: 7.10.0 Dec 3 09:08:56 np0005543225 systemd[1]: libpod-54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99.scope: Deactivated successfully. Dec 3 09:08:56 np0005543225 systemd[1]: libpod-54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99.scope: Consumed 3.094s CPU time. Dec 3 09:08:56 np0005543225 podman[62685]: 2025-12-03 09:08:56.043429347 +0000 UTC m=+3.580058999 container died 54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-collectd-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 collectd, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., build-date=2025-11-18T22:51:28Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 collectd, version=17.1.12, managed_by=tripleo_ansible, name=rhosp17/openstack-collectd, release=1761123044, distribution-scope=public, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.4, vcs-type=git) Dec 3 09:08:56 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:56 np0005543225 puppet-user[62789]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Dec 3 09:08:56 np0005543225 puppet-user[62827]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Dec 3 09:08:56 np0005543225 puppet-user[62789]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Dec 3 09:08:56 np0005543225 puppet-user[62840]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Dec 3 09:08:56 np0005543225 puppet-user[62827]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Dec 3 09:08:56 np0005543225 puppet-user[62827]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:56 np0005543225 puppet-user[62827]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:56 np0005543225 puppet-user[62827]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:56 np0005543225 puppet-user[62827]: file names. Dec 3 09:08:56 np0005543225 puppet-user[62827]: Dec 3 09:08:56 np0005543225 puppet-user[62827]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:56 np0005543225 puppet-user[62827]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:56 np0005543225 puppet-user[62827]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:56 np0005543225 puppet-user[62789]: Warning: Scope(Apache::Vhost[cinder_wsgi]): Dec 3 09:08:56 np0005543225 puppet-user[62789]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:56 np0005543225 puppet-user[62789]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:56 np0005543225 puppet-user[62789]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:56 np0005543225 puppet-user[62789]: file names. Dec 3 09:08:56 np0005543225 puppet-user[62789]: Dec 3 09:08:56 np0005543225 puppet-user[62789]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:56 np0005543225 puppet-user[62789]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:56 np0005543225 puppet-user[62789]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:56 np0005543225 podman[63401]: 2025-12-03 09:08:56.37708998 +0000 UTC m=+0.323122145 container cleanup 54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, url=https://www.redhat.com, config_id=tripleo_puppet_step1, com.redhat.component=openstack-collectd-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, release=1761123044, version=17.1.12, description=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-collectd, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 collectd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, architecture=x86_64, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, build-date=2025-11-18T22:51:28Z, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4) Dec 3 09:08:56 np0005543225 puppet-user[62840]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Dec 3 09:08:56 np0005543225 puppet-user[62840]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:56 np0005543225 puppet-user[62840]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:56 np0005543225 puppet-user[62840]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:56 np0005543225 puppet-user[62840]: file names. Dec 3 09:08:56 np0005543225 puppet-user[62840]: Dec 3 09:08:56 np0005543225 puppet-user[62840]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:56 np0005543225 puppet-user[62840]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:56 np0005543225 puppet-user[62840]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:56 np0005543225 systemd[1]: libpod-conmon-54ce908e5e9a1b7c3c89df96481539265d7db835ea9cc45c1cddb611b1599e99.scope: Deactivated successfully. Dec 3 09:08:56 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-collectd --conmon-pidfile /run/container-puppet-collectd.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,collectd_client_config,exec --env NAME=collectd --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::collectd --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-collectd --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-collectd.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Dec 3 09:08:56 np0005543225 podman[63408]: 2025-12-03 09:08:56.415564121 +0000 UTC m=+0.347908693 container create 9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, name=rhosp17/openstack-haproxy, vcs-type=git, io.openshift.expose-services=, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, release=1761123044, description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:50:48Z, com.redhat.component=openstack-haproxy-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., managed_by=tripleo_ansible, architecture=x86_64, io.buildah.version=1.41.4, distribution-scope=public, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:08:56 np0005543225 systemd[1]: Started libpod-conmon-9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea.scope. Dec 3 09:08:56 np0005543225 podman[63408]: 2025-12-03 09:08:56.1607649 +0000 UTC m=+0.093109432 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Dec 3 09:08:56 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:56 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6dd7c835768f759c1b5b3300c97b0f8fb8f9cfec390c49cc47c24590072f6c91/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:56 np0005543225 podman[63408]: 2025-12-03 09:08:56.48677468 +0000 UTC m=+0.419119222 container init 9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, build-date=2025-11-18T22:50:48Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, tcib_managed=true, vendor=Red Hat, Inc., url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-haproxy, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 haproxy, managed_by=tripleo_ansible, release=1761123044, container_name=container-puppet-haproxy, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git) Dec 3 09:08:56 np0005543225 puppet-user[62789]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.88 seconds Dec 3 09:08:56 np0005543225 podman[63408]: 2025-12-03 09:08:56.497399522 +0000 UTC m=+0.429744094 container start 9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., managed_by=tripleo_ansible, release=1761123044, vcs-type=git, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 haproxy, container_name=container-puppet-haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-haproxy, build-date=2025-11-18T22:50:48Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, com.redhat.component=openstack-haproxy-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, tcib_managed=true, io.openshift.expose-services=, version=17.1.12) Dec 3 09:08:56 np0005543225 podman[63408]: 2025-12-03 09:08:56.498155162 +0000 UTC m=+0.430499764 container attach 9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, build-date=2025-11-18T22:50:48Z, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team, vcs-type=git, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., name=rhosp17/openstack-haproxy, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 haproxy, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, url=https://www.redhat.com, container_name=container-puppet-haproxy, com.redhat.component=openstack-haproxy-container, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.64 seconds Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.69 seconds Dec 3 09:08:56 np0005543225 systemd[1]: var-lib-containers-storage-overlay-a6ebb4022c382c281394ece85c6657443abbf774da0634e48e9674a616e6c743-merged.mount: Deactivated successfully. Dec 3 09:08:56 np0005543225 systemd[1]: libpod-f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707.scope: Deactivated successfully. Dec 3 09:08:56 np0005543225 systemd[1]: libpod-f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707.scope: Consumed 3.269s CPU time. Dec 3 09:08:56 np0005543225 podman[63532]: 2025-12-03 09:08:56.80716992 +0000 UTC m=+0.050216913 container died f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, description=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, build-date=2025-11-19T00:11:59Z, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, release=1761123044, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, config_id=tripleo_puppet_step1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-ceilometer, distribution-scope=public, vcs-type=git, io.openshift.expose-services=, batch=17.1_20251118.1, com.redhat.component=openstack-ceilometer-central-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Dec 3 09:08:56 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:08:56 np0005543225 systemd[1]: var-lib-containers-storage-overlay-0c0ae4cbd75d15655d98fddf1973e7a05461a3fea7fb25a6282cc34ef8c415f2-merged.mount: Deactivated successfully. Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:08:56 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:08:56 np0005543225 podman[63533]: 2025-12-03 09:08:56.845246651 +0000 UTC m=+0.086554328 container create 6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, name=rhosp17/openstack-heat-api, distribution-scope=public, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-heat-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:11:00Z, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, description=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, container_name=container-puppet-heat_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, tcib_managed=true, io.buildah.version=1.41.4, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:08:56 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:08:56 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:08:56 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:08:56 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:08:56 np0005543225 podman[63532]: 2025-12-03 09:08:56.864132452 +0000 UTC m=+0.107179425 container cleanup f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707 (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, vendor=Red Hat, Inc., vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, container_name=container-puppet-ceilometer, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp17/openstack-ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, distribution-scope=public, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, release=1761123044, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, com.redhat.component=openstack-ceilometer-central-container, build-date=2025-11-19T00:11:59Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team) Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:08:56 np0005543225 systemd[1]: libpod-conmon-f3ddade8a90d868006f0f811e5b6feab29df5bad3f9ac49ab786cb74bbd79707.scope: Deactivated successfully. Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}3251219f5952917a9363b8f382ca9f708ca266277afd0de97e444188006f0750' Dec 3 09:08:56 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ceilometer --conmon-pidfile /run/container-puppet-ceilometer.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config --env NAME=ceilometer --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::ceilometer::agent::polling#012#012include tripleo::profile::base::ceilometer::agent::notification#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ceilometer --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ceilometer.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:08:56 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:08:56 np0005543225 podman[63533]: 2025-12-03 09:08:56.796610191 +0000 UTC m=+0.037917878 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:08:56 np0005543225 systemd[1]: Started libpod-conmon-6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4.scope. Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:08:56 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}f141607bee438692c97e13f68dca080c381f287969c2d4b2d20d90cc2a7fde2d' Dec 3 09:08:56 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:56 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/aa67f286afe5b3ec6665bd2f059ef029c96c37bf450c3d3619bc2d881a5ec019/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:08:56 np0005543225 podman[63533]: 2025-12-03 09:08:56.957946531 +0000 UTC m=+0.199254208 container init 6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, release=1761123044, io.openshift.expose-services=, container_name=container-puppet-heat_api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, tcib_managed=true, vendor=Red Hat, Inc., build-date=2025-11-19T00:11:00Z, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, name=rhosp17/openstack-heat-api, com.redhat.component=openstack-heat-api-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, version=17.1.12, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 heat-api) Dec 3 09:08:56 np0005543225 podman[63533]: 2025-12-03 09:08:56.963077577 +0000 UTC m=+0.204385244 container start 6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-heat-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vendor=Red Hat, Inc., vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, release=1761123044, distribution-scope=public, version=17.1.12, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, name=rhosp17/openstack-heat-api, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-heat_api, build-date=2025-11-19T00:11:00Z, io.buildah.version=1.41.4, vcs-type=git, tcib_managed=true, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd) Dec 3 09:08:56 np0005543225 podman[63533]: 2025-12-03 09:08:56.963217501 +0000 UTC m=+0.204525168 container attach 6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, com.redhat.component=openstack-heat-api-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, container_name=container-puppet-heat_api, build-date=2025-11-19T00:11:00Z, batch=17.1_20251118.1, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, version=17.1.12, vendor=Red Hat, Inc., name=rhosp17/openstack-heat-api, io.buildah.version=1.41.4, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, summary=Red Hat OpenStack Platform 17.1 heat-api) Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:08:56 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:08:57 np0005543225 podman[63634]: 2025-12-03 09:08:57.31520949 +0000 UTC m=+0.097463707 container create 5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, build-date=2025-11-19T00:10:53Z, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, container_name=container-puppet-heat_api_cfn, batch=17.1_20251118.1, tcib_managed=true, com.redhat.component=openstack-heat-api-cfn-container, config_id=tripleo_puppet_step1, distribution-scope=public, name=rhosp17/openstack-heat-api-cfn, io.buildah.version=1.41.4, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, vendor=Red Hat, Inc., managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.12, maintainer=OpenStack TripleO Team, release=1761123044) Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Dec 3 09:08:57 np0005543225 systemd[1]: Started libpod-conmon-5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452.scope. Dec 3 09:08:57 np0005543225 podman[63634]: 2025-12-03 09:08:57.261469745 +0000 UTC m=+0.043724032 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Dec 3 09:08:57 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:57 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/11a964f7e89b2040e02de70094d7f2572a8bd67a3848c3d102474c58628bd0cc/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:08:57 np0005543225 podman[63634]: 2025-12-03 09:08:57.399380814 +0000 UTC m=+0.181635031 container init 5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.buildah.version=1.41.4, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, release=1761123044, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20251118.1, distribution-scope=public, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, build-date=2025-11-19T00:10:53Z, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, version=17.1.12, com.redhat.component=openstack-heat-api-cfn-container, name=rhosp17/openstack-heat-api-cfn, managed_by=tripleo_ansible, architecture=x86_64, vendor=Red Hat, Inc., vcs-type=git, maintainer=OpenStack TripleO Team, container_name=container-puppet-heat_api_cfn) Dec 3 09:08:57 np0005543225 podman[63634]: 2025-12-03 09:08:57.409411489 +0000 UTC m=+0.191665706 container start 5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, managed_by=tripleo_ansible, io.openshift.expose-services=, name=rhosp17/openstack-heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-heat-api-cfn-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, tcib_managed=true, build-date=2025-11-19T00:10:53Z, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vendor=Red Hat, Inc., container_name=container-puppet-heat_api_cfn, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-type=git, maintainer=OpenStack TripleO Team) Dec 3 09:08:57 np0005543225 podman[63634]: 2025-12-03 09:08:57.409585384 +0000 UTC m=+0.191839601 container attach 5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, name=rhosp17/openstack-heat-api-cfn, com.redhat.component=openstack-heat-api-cfn-container, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1, release=1761123044, container_name=container-puppet-heat_api_cfn, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, managed_by=tripleo_ansible, build-date=2025-11-19T00:10:53Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., batch=17.1_20251118.1) Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Lvm/Augeas[udev options in lvm.conf]/returns: executed successfully Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}497fa2ce9933be28501f1fc33c6df9353a8b4920e7aede5589ffb72e0272a4bb' Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/api_paste_config]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/storage_availability_zone]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/default_availability_zone]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/enable_v3_api]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Glance/Cinder_config[DEFAULT/glance_api_servers]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/region_name]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/interface]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_type]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_url]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/username]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/user_domain_name]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Dec 3 09:08:57 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/password]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_name]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_domain_name]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}cd7489ecfd8c2facb962e118ec113afaf89e37f1e5caee4d345934543a29568c' Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Cron::Db_purge/Cron[cinder-manage db purge]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_listen]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_workers]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/default_volume_type]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/auth_strategy]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_workers]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_max_operations]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_driver]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}53ffdf895b05d18556937695b658d02c280223dfcc78a1347a95ee630ae488e8' Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/swift_catalog_info]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_swift_container]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_compression_algorithm]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Scheduler/Cinder_config[DEFAULT/scheduler_driver]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[63473]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[DEFAULT/enabled_backends]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[tripleo_iscsi/backend_host]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/connection]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/max_retries]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62827]: Notice: Applied catalog in 1.78 seconds Dec 3 09:08:58 np0005543225 puppet-user[62827]: Application: Dec 3 09:08:58 np0005543225 puppet-user[62827]: Initial environment: production Dec 3 09:08:58 np0005543225 puppet-user[62827]: Converged environment: production Dec 3 09:08:58 np0005543225 puppet-user[62827]: Run mode: user Dec 3 09:08:58 np0005543225 puppet-user[62827]: Changes: Dec 3 09:08:58 np0005543225 puppet-user[62827]: Total: 92 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Events: Dec 3 09:08:58 np0005543225 puppet-user[62827]: Success: 92 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Total: 92 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Resources: Dec 3 09:08:58 np0005543225 puppet-user[62827]: Skipped: 38 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Changed: 92 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Out of sync: 92 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Total: 307 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Time: Dec 3 09:08:58 np0005543225 puppet-user[62827]: Concat file: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Anchor: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Concat fragment: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Glance image import config: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Glance swift config: 0.01 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Glance cache config: 0.01 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Cron: 0.01 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Augeas: 0.02 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Package: 0.02 Dec 3 09:08:58 np0005543225 puppet-user[62827]: File: 0.11 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Glance api config: 1.34 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Transaction evaluation: 1.77 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Config retrieval: 1.77 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Catalog application: 1.78 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Last run: 1764752938 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Resources: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Total: 1.78 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Version: Dec 3 09:08:58 np0005543225 puppet-user[62827]: Config: 1764752934 Dec 3 09:08:58 np0005543225 puppet-user[62827]: Puppet: 7.10.0 Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/db_max_retries]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Dec 3 09:08:58 np0005543225 ovs-vsctl[63712]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:08:58 np0005543225 puppet-user[62840]: Notice: Applied catalog in 1.97 seconds Dec 3 09:08:58 np0005543225 puppet-user[62840]: Application: Dec 3 09:08:58 np0005543225 puppet-user[62840]: Initial environment: production Dec 3 09:08:58 np0005543225 puppet-user[62840]: Converged environment: production Dec 3 09:08:58 np0005543225 puppet-user[62840]: Run mode: user Dec 3 09:08:58 np0005543225 puppet-user[62840]: Changes: Dec 3 09:08:58 np0005543225 puppet-user[62840]: Total: 92 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Events: Dec 3 09:08:58 np0005543225 puppet-user[62840]: Success: 92 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Total: 92 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Resources: Dec 3 09:08:58 np0005543225 puppet-user[62840]: Skipped: 38 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Changed: 92 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Out of sync: 92 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Total: 307 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Time: Dec 3 09:08:58 np0005543225 puppet-user[62840]: Concat file: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Anchor: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Concat fragment: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Glance image import config: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Glance swift config: 0.01 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Glance cache config: 0.02 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Cron: 0.02 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Augeas: 0.02 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Package: 0.03 Dec 3 09:08:58 np0005543225 puppet-user[62840]: File: 0.13 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Glance api config: 1.47 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Config retrieval: 1.85 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Transaction evaluation: 1.96 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Catalog application: 1.97 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Last run: 1764752938 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Resources: 0.00 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Total: 1.97 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Version: Dec 3 09:08:58 np0005543225 puppet-user[62840]: Config: 1764752934 Dec 3 09:08:58 np0005543225 puppet-user[62840]: Puppet: 7.10.0 Dec 3 09:08:58 np0005543225 puppet-user[63587]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:58 np0005543225 puppet-user[63587]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:58 np0005543225 puppet-user[63587]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:58 np0005543225 puppet-user[63587]: (file & line not available) Dec 3 09:08:58 np0005543225 puppet-user[63587]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:58 np0005543225 puppet-user[63587]: (file & line not available) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/rpc_response_timeout]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/control_exchange]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[63473]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:59 np0005543225 puppet-user[63473]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:59 np0005543225 puppet-user[63473]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:59 np0005543225 puppet-user[63473]: (file & line not available) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder/Oslo::Concurrency[cinder_config]/Cinder_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/debug]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[63587]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Dec 3 09:08:59 np0005543225 puppet-user[63587]: removed in a future realse. Use heat::db::database_connection instead Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:59 np0005543225 systemd[1]: libpod-a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b.scope: Deactivated successfully. Dec 3 09:08:59 np0005543225 systemd[1]: libpod-a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b.scope: Consumed 6.032s CPU time. Dec 3 09:08:59 np0005543225 podman[62684]: 2025-12-03 09:08:59.174100031 +0000 UTC m=+6.717589215 container died a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-glance-api-container, architecture=x86_64, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20251118.1, container_name=container-puppet-glance_api, version=17.1.12, description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-glance-api, build-date=2025-11-18T23:45:01Z, vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, distribution-scope=public, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, io.openshift.expose-services=, maintainer=OpenStack TripleO Team) Dec 3 09:08:59 np0005543225 puppet-user[63473]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:59 np0005543225 puppet-user[63473]: (file & line not available) Dec 3 09:08:59 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:59 np0005543225 systemd[1]: var-lib-containers-storage-overlay-e0de8ea8501a73fc3e07925a1abf006a380f8633ef2050e372028512ee99f90b-merged.mount: Deactivated successfully. Dec 3 09:08:59 np0005543225 ovs-vsctl[63885]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_type]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/region_name]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_url]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[63673]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:59 np0005543225 puppet-user[63673]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:59 np0005543225 puppet-user[63673]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:59 np0005543225 puppet-user[63673]: (file & line not available) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/username]/ensure: created Dec 3 09:08:59 np0005543225 podman[63868]: 2025-12-03 09:08:59.401580426 +0000 UTC m=+0.220827859 container cleanup a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, build-date=2025-11-18T23:45:01Z, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, release=1761123044, maintainer=OpenStack TripleO Team, version=17.1.12, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp17/openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.component=openstack-glance-api-container, batch=17.1_20251118.1, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, container_name=container-puppet-glance_api, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1) Dec 3 09:08:59 np0005543225 systemd[1]: libpod-conmon-a545514e963033620808aba0b129f8056a5585a8fd2203e643f96e38b705de5b.scope: Deactivated successfully. Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/password]/ensure: created Dec 3 09:08:59 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api --conmon-pidfile /run/container-puppet-glance_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::glance::api#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/user_domain_name]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[63673]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:59 np0005543225 puppet-user[63673]: (file & line not available) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_name]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_domain_name]/ensure: created Dec 3 09:08:59 np0005543225 systemd[1]: libpod-f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42.scope: Deactivated successfully. Dec 3 09:08:59 np0005543225 systemd[1]: libpod-f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42.scope: Consumed 6.219s CPU time. Dec 3 09:08:59 np0005543225 podman[62676]: 2025-12-03 09:08:59.469983612 +0000 UTC m=+7.019900387 container died f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, io.openshift.expose-services=, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, build-date=2025-11-18T23:45:01Z, description=Red Hat OpenStack Platform 17.1 glance-api, release=1761123044, config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-glance_api_internal, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, batch=17.1_20251118.1, distribution-scope=public, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, com.redhat.component=openstack-glance-api-container, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., tcib_managed=true, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-glance-api) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/send_service_user_token]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:08:59 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:59 np0005543225 podman[63981]: 2025-12-03 09:08:59.545534626 +0000 UTC m=+0.067594564 container cleanup f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, io.openshift.expose-services=, batch=17.1_20251118.1, build-date=2025-11-18T23:45:01Z, url=https://www.redhat.com, name=rhosp17/openstack-glance-api, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 glance-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, vcs-type=git, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64, distribution-scope=public, com.redhat.component=openstack-glance-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, io.buildah.version=1.41.4, tcib_managed=true, release=1761123044, container_name=container-puppet-glance_api_internal, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:08:59 np0005543225 systemd[1]: libpod-conmon-f7ec80f55f464160f346c5f30dac27dfd914d7008174301a2c095a82e9237f42.scope: Deactivated successfully. Dec 3 09:08:59 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api_internal --conmon-pidfile /run/container-puppet-glance_api_internal.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api_internal --env STEP_CONFIG=include ::tripleo::packages#012class { 'tripleo::profile::base::glance::api':#012 bind_port => 9293,#012 tls_proxy_port => 9293,#012 log_file => '/var/log/glance/api_internal.log',#012 show_image_direct_url => true,#012 show_multiple_locations => true,#012}#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api_internal --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api_internal.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 09:08:59 np0005543225 puppet-user[63673]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Dec 3 09:08:59 np0005543225 puppet-user[63673]: removed in a future realse. Use heat::db::database_connection instead Dec 3 09:08:59 np0005543225 puppet-user[63473]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[63473]: Warning: Scope(Haproxy::Config[haproxy]): haproxy: The $merge_options parameter will default to true in the next major release. Please review the documentation regarding the implications. Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/username]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/password]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/interface]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Policy/Oslo::Policy[cinder_config]/Cinder_config[oslo_policy/policy_file]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Api/Oslo::Middleware[cinder_config]/Cinder_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[63473]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.84 seconds Dec 3 09:08:59 np0005543225 podman[64076]: 2025-12-03 09:08:59.88638605 +0000 UTC m=+0.072992198 container create 539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, vendor=Red Hat, Inc., architecture=x86_64, url=https://www.redhat.com, build-date=2025-11-19T00:11:00Z, maintainer=OpenStack TripleO Team, tcib_managed=true, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, io.buildah.version=1.41.4, vcs-type=git, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, name=rhosp17/openstack-heat-api, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, summary=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat, managed_by=tripleo_ansible) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[/var/www/cgi-bin/cinder]/group: group changed 'root' to 'cinder' Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[cinder_wsgi]/ensure: defined content as '{sha256}4edb31cc3eee33c28f8a9c6c47aaad65265bca7f5a84782e4481666691daacea' Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_backend_name]/ensure: created Dec 3 09:08:59 np0005543225 systemd[1]: Started libpod-conmon-539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01.scope. Dec 3 09:08:59 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_driver]/ensure: created Dec 3 09:08:59 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c232b2b220c3c786ac3abf804c22dfd88847d01f228ec662dfd7020912b09089/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_ip_address]/ensure: created Dec 3 09:08:59 np0005543225 podman[64076]: 2025-12-03 09:08:59.947788318 +0000 UTC m=+0.134394466 container init 539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, build-date=2025-11-19T00:11:00Z, managed_by=tripleo_ansible, version=17.1.12, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat, vcs-type=git, vendor=Red Hat, Inc., io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.component=openstack-heat-api-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-heat-api, release=1761123044) Dec 3 09:08:59 np0005543225 podman[64076]: 2025-12-03 09:08:59.849207393 +0000 UTC m=+0.035813551 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_helper]/ensure: created Dec 3 09:08:59 np0005543225 podman[64076]: 2025-12-03 09:08:59.957431175 +0000 UTC m=+0.144037303 container start 539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, config_id=tripleo_puppet_step1, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-heat-api, distribution-scope=public, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, vcs-type=git, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-19T00:11:00Z, summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.component=openstack-heat-api-container, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, container_name=container-puppet-heat, tcib_managed=true, version=17.1.12) Dec 3 09:08:59 np0005543225 podman[64076]: 2025-12-03 09:08:59.957675361 +0000 UTC m=+0.144281529 container attach 539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, vcs-type=git, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, io.buildah.version=1.41.4, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, name=rhosp17/openstack-heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, build-date=2025-11-19T00:11:00Z, release=1761123044, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=container-puppet-heat, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible) Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volumes_dir]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_protocol]/ensure: created Dec 3 09:08:59 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:00 np0005543225 podman[64104]: 2025-12-03 09:09:00.002733617 +0000 UTC m=+0.086842776 container create 4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, name=rhosp17/openstack-horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, distribution-scope=public, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, container_name=container-puppet-horizon, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, com.redhat.component=openstack-horizon-container, build-date=2025-11-18T23:41:37Z, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, url=https://www.redhat.com, architecture=x86_64, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 horizon, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, vendor=Red Hat, Inc., io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon) Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/Apache::Vhost[cinder_wsgi]/Concat[10-cinder_wsgi.conf]/File[/etc/httpd/conf.d/10-cinder_wsgi.conf]/ensure: defined content as '{sha256}9d09c27d5862afbc6347aea1128a339bebae346b59fa9ba5cf267ed5cd176c57' Dec 3 09:09:00 np0005543225 systemd[1]: Started libpod-conmon-4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3.scope. Dec 3 09:09:00 np0005543225 puppet-user[62789]: Notice: Applied catalog in 3.35 seconds Dec 3 09:09:00 np0005543225 puppet-user[62789]: Application: Dec 3 09:09:00 np0005543225 puppet-user[62789]: Initial environment: production Dec 3 09:09:00 np0005543225 puppet-user[62789]: Converged environment: production Dec 3 09:09:00 np0005543225 puppet-user[62789]: Run mode: user Dec 3 09:09:00 np0005543225 puppet-user[62789]: Changes: Dec 3 09:09:00 np0005543225 puppet-user[62789]: Total: 114 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Events: Dec 3 09:09:00 np0005543225 puppet-user[62789]: Success: 114 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Total: 114 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Resources: Dec 3 09:09:00 np0005543225 puppet-user[62789]: Changed: 114 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Out of sync: 114 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Skipped: 43 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Total: 381 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Time: Dec 3 09:09:00 np0005543225 puppet-user[62789]: Resources: 0.00 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Concat file: 0.00 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Anchor: 0.00 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Concat fragment: 0.00 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Cron: 0.01 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Package: 0.03 Dec 3 09:09:00 np0005543225 puppet-user[62789]: File: 0.15 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Augeas: 0.56 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Last run: 1764752940 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Config retrieval: 2.09 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Cinder config: 2.29 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Transaction evaluation: 3.33 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Catalog application: 3.35 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Total: 3.35 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Version: Dec 3 09:09:00 np0005543225 puppet-user[62789]: Config: 1764752934 Dec 3 09:09:00 np0005543225 puppet-user[62789]: Puppet: 7.10.0 Dec 3 09:09:00 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:00 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3afca6ff6c9885e38264c14dc1a8f288646b8c924710b172adaaa58805e9b49a/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:00 np0005543225 podman[64104]: 2025-12-03 09:09:00.055929368 +0000 UTC m=+0.140038517 container init 4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, name=rhosp17/openstack-horizon, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, description=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, com.redhat.component=openstack-horizon-container, vcs-type=git, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, url=https://www.redhat.com, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, version=17.1.12, build-date=2025-11-18T23:41:37Z, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, container_name=container-puppet-horizon, distribution-scope=public, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon) Dec 3 09:09:00 np0005543225 podman[64104]: 2025-12-03 09:09:00.064431793 +0000 UTC m=+0.148540942 container start 4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, name=rhosp17/openstack-horizon, build-date=2025-11-18T23:41:37Z, io.openshift.expose-services=, architecture=x86_64, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, container_name=container-puppet-horizon, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, vcs-type=git, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-horizon-container, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Dec 3 09:09:00 np0005543225 podman[64104]: 2025-12-03 09:09:00.064620568 +0000 UTC m=+0.148729717 container attach 4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, name=rhosp17/openstack-horizon, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, vcs-type=git, batch=17.1_20251118.1, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, container_name=container-puppet-horizon, build-date=2025-11-18T23:41:37Z, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.component=openstack-horizon-container, summary=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, managed_by=tripleo_ansible) Dec 3 09:09:00 np0005543225 podman[64104]: 2025-12-03 09:08:59.968891059 +0000 UTC m=+0.053000238 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/content: content changed '{sha256}8afc9a0bcc462f08af54b6ac1cbfc3b8343b1feee00b4ab07d7a8c7b47065f0b' to '{sha256}a7c76ceda0319fe532a1eb483ca356628d5abe3ca97628b5baa2e0c22dc1332f' Dec 3 09:09:00 np0005543225 puppet-user[63473]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/mode: mode changed '0644' to '0640' Dec 3 09:09:00 np0005543225 puppet-user[63473]: Notice: Applied catalog in 0.23 seconds Dec 3 09:09:00 np0005543225 puppet-user[63473]: Application: Dec 3 09:09:00 np0005543225 puppet-user[63473]: Initial environment: production Dec 3 09:09:00 np0005543225 puppet-user[63473]: Converged environment: production Dec 3 09:09:00 np0005543225 puppet-user[63473]: Run mode: user Dec 3 09:09:00 np0005543225 puppet-user[63473]: Changes: Dec 3 09:09:00 np0005543225 puppet-user[63473]: Total: 2 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Events: Dec 3 09:09:00 np0005543225 puppet-user[63473]: Success: 2 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Total: 2 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Resources: Dec 3 09:09:00 np0005543225 puppet-user[63473]: Changed: 1 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Out of sync: 1 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Skipped: 34 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Total: 76 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Time: Dec 3 09:09:00 np0005543225 puppet-user[63473]: Concat file: 0.00 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Concat fragment: 0.00 Dec 3 09:09:00 np0005543225 puppet-user[63473]: File: 0.09 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Transaction evaluation: 0.22 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Catalog application: 0.23 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Config retrieval: 0.92 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Last run: 1764752940 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Total: 0.23 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Version: Dec 3 09:09:00 np0005543225 puppet-user[63473]: Config: 1764752939 Dec 3 09:09:00 np0005543225 puppet-user[63473]: Puppet: 7.10.0 Dec 3 09:09:00 np0005543225 systemd[1]: var-lib-containers-storage-overlay-27732e52ee4e69ac63f5cce64d0ca5225914b2134f6617c28d17012fa5006aef-merged.mount: Deactivated successfully. Dec 3 09:09:00 np0005543225 puppet-user[63587]: Warning: Scope(Apache::Vhost[heat_api_wsgi]): Dec 3 09:09:00 np0005543225 puppet-user[63587]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:00 np0005543225 puppet-user[63587]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:00 np0005543225 puppet-user[63587]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:00 np0005543225 puppet-user[63587]: file names. Dec 3 09:09:00 np0005543225 puppet-user[63587]: Dec 3 09:09:00 np0005543225 puppet-user[63587]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:00 np0005543225 puppet-user[63587]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:00 np0005543225 puppet-user[63587]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:00 np0005543225 puppet-user[63587]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.70 seconds Dec 3 09:09:00 np0005543225 systemd[1]: libpod-9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea.scope: Deactivated successfully. Dec 3 09:09:00 np0005543225 systemd[1]: libpod-9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea.scope: Consumed 3.974s CPU time. Dec 3 09:09:00 np0005543225 podman[63408]: 2025-12-03 09:09:00.617843787 +0000 UTC m=+4.550188319 container died 9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, build-date=2025-11-18T22:50:48Z, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., container_name=container-puppet-haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, managed_by=tripleo_ansible, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, version=17.1.12, release=1761123044, batch=17.1_20251118.1, name=rhosp17/openstack-haproxy, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:09:00 np0005543225 puppet-user[63673]: Warning: Scope(Apache::Vhost[heat_api_cfn_wsgi]): Dec 3 09:09:00 np0005543225 puppet-user[63673]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:00 np0005543225 puppet-user[63673]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:00 np0005543225 puppet-user[63673]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:00 np0005543225 puppet-user[63673]: file names. Dec 3 09:09:00 np0005543225 puppet-user[63673]: Dec 3 09:09:00 np0005543225 puppet-user[63673]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:00 np0005543225 puppet-user[63673]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:00 np0005543225 puppet-user[63673]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:00 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:00 np0005543225 systemd[1]: var-lib-containers-storage-overlay-6dd7c835768f759c1b5b3300c97b0f8fb8f9cfec390c49cc47c24590072f6c91-merged.mount: Deactivated successfully. Dec 3 09:09:00 np0005543225 podman[64211]: 2025-12-03 09:09:00.752083339 +0000 UTC m=+0.125676516 container cleanup 9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, name=rhosp17/openstack-haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:50:48Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, io.openshift.expose-services=, architecture=x86_64, vcs-type=git, distribution-scope=public, com.redhat.component=openstack-haproxy-container, release=1761123044, config_id=tripleo_puppet_step1, container_name=container-puppet-haproxy, io.buildah.version=1.41.4, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, maintainer=OpenStack TripleO Team) Dec 3 09:09:00 np0005543225 systemd[1]: libpod-conmon-9380cf5b04322bd43f88075e21d4748b9882e920378aaf6f31a3bd7ff7e3b1ea.scope: Deactivated successfully. Dec 3 09:09:00 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-haproxy --conmon-pidfile /run/container-puppet-haproxy.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,haproxy_config --env NAME=haproxy --env STEP_CONFIG=include ::tripleo::packages#012exec {'wait-for-settle': command => '/bin/true' }#012class tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}#012['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::haproxy_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-haproxy --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-haproxy.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro --volume /etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro --volume /etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Dec 3 09:09:00 np0005543225 puppet-user[63673]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.39 seconds Dec 3 09:09:00 np0005543225 systemd[1]: libpod-e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0.scope: Deactivated successfully. Dec 3 09:09:00 np0005543225 systemd[1]: libpod-e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0.scope: Consumed 7.766s CPU time. Dec 3 09:09:00 np0005543225 podman[62700]: 2025-12-03 09:09:00.794374091 +0000 UTC m=+8.323411532 container died e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, build-date=2025-11-19T00:20:06Z, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, config_id=tripleo_puppet_step1, name=rhosp17/openstack-cinder-api, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, version=17.1.12, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, release=1761123044, container_name=container-puppet-cinder, com.redhat.component=openstack-cinder-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, io.buildah.version=1.41.4, vcs-type=git, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-api) Dec 3 09:09:00 np0005543225 podman[64246]: 2025-12-03 09:09:00.958062554 +0000 UTC m=+0.157693345 container cleanup e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, com.redhat.component=openstack-cinder-api-container, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vendor=Red Hat, Inc., release=1761123044, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, name=rhosp17/openstack-cinder-api, summary=Red Hat OpenStack Platform 17.1 cinder-api, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2025-11-19T00:20:06Z, container_name=container-puppet-cinder, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, vcs-type=git) Dec 3 09:09:00 np0005543225 systemd[1]: libpod-conmon-e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0.scope: Deactivated successfully. Dec 3 09:09:00 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-cinder --conmon-pidfile /run/container-puppet-cinder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line --env NAME=cinder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::cinder::api#012include tripleo::profile::base::database::mysql::client#012#012include tripleo::profile::base::cinder::backup::swift#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::cinder::backup_bundle#012include tripleo::profile::base::cinder::scheduler#012#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::lvm#012include tripleo::profile::pacemaker::cinder::volume_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-cinder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-cinder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Dec 3 09:09:00 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Dec 3 09:09:00 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Dec 3 09:09:00 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Dec 3 09:09:00 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Dec 3 09:09:00 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Api/Heat_config[heat_api/bind_host]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:01 np0005543225 systemd[1]: var-lib-containers-storage-overlay-b2a7679fe7e5382e32be037f3f0f909cbc531cc6863fb357d99ac0f5240f2307-merged.mount: Deactivated successfully. Dec 3 09:09:01 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e794375c0e12fe4b39dcfbec4a90605151687145a144b60179e049bee0970aa0-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Dec 3 09:09:01 np0005543225 podman[64338]: 2025-12-03 09:09:01.243427015 +0000 UTC m=+0.084919414 container create fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-iscsid-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, build-date=2025-11-18T23:44:13Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, container_name=container-puppet-iscsid, batch=17.1_20251118.1, name=rhosp17/openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, version=17.1.12, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, vendor=Red Hat, Inc., io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, distribution-scope=public) Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:01 np0005543225 systemd[1]: Started libpod-conmon-fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e.scope. Dec 3 09:09:01 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:01 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f65f732587863bc8bd5bdb1137df20c9073ee340731d36f854251a9a67255891/merged/tmp/iscsi.host supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:01 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f65f732587863bc8bd5bdb1137df20c9073ee340731d36f854251a9a67255891/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:01 np0005543225 podman[64338]: 2025-12-03 09:09:01.209528346 +0000 UTC m=+0.051020765 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Dec 3 09:09:01 np0005543225 podman[64338]: 2025-12-03 09:09:01.315166139 +0000 UTC m=+0.156658538 container init fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, build-date=2025-11-18T23:44:13Z, distribution-scope=public, architecture=x86_64, container_name=container-puppet-iscsid, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-iscsid-container, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, release=1761123044, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 iscsid, maintainer=OpenStack TripleO Team, version=17.1.12) Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Dec 3 09:09:01 np0005543225 podman[64338]: 2025-12-03 09:09:01.32726051 +0000 UTC m=+0.168752909 container start fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, name=rhosp17/openstack-iscsid, maintainer=OpenStack TripleO Team, container_name=container-puppet-iscsid, version=17.1.12, release=1761123044, description=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, build-date=2025-11-18T23:44:13Z, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, tcib_managed=true, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, managed_by=tripleo_ansible, com.redhat.component=openstack-iscsid-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1) Dec 3 09:09:01 np0005543225 podman[64338]: 2025-12-03 09:09:01.328322837 +0000 UTC m=+0.169815256 container attach fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, batch=17.1_20251118.1, version=17.1.12, com.redhat.component=openstack-iscsid-container, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T23:44:13Z, vendor=Red Hat, Inc., release=1761123044, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-iscsid, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 iscsid, architecture=x86_64, container_name=container-puppet-iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4) Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Api_cfn/Heat_config[heat_api_cfn/bind_host]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:01 np0005543225 podman[64387]: 2025-12-03 09:09:01.383759029 +0000 UTC m=+0.069233949 container create 0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, maintainer=OpenStack TripleO Team, architecture=x86_64, io.buildah.version=1.41.4, name=rhosp17/openstack-keystone, url=https://www.redhat.com, container_name=container-puppet-keystone, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., batch=17.1_20251118.1, tcib_managed=true, version=17.1.12, description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, release=1761123044, build-date=2025-11-18T23:45:30Z, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d) Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:01 np0005543225 systemd[1]: Started libpod-conmon-0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b.scope. Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:01 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:01 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0f02f80c6d22cdc5384a31dcd3095b13abffa0b36bcf2863f3ecfb6f560a4c8d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:01 np0005543225 podman[64387]: 2025-12-03 09:09:01.350540247 +0000 UTC m=+0.036015197 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Dec 3 09:09:01 np0005543225 podman[64387]: 2025-12-03 09:09:01.451990278 +0000 UTC m=+0.137465198 container init 0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, url=https://www.redhat.com, com.redhat.component=openstack-keystone-container, description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, release=1761123044, distribution-scope=public, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T23:45:30Z, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, name=rhosp17/openstack-keystone, maintainer=OpenStack TripleO Team, container_name=container-puppet-keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.expose-services=, vcs-type=git) Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:01 np0005543225 podman[64387]: 2025-12-03 09:09:01.457797572 +0000 UTC m=+0.143272522 container start 0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 keystone, architecture=x86_64, vcs-type=git, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.buildah.version=1.41.4, io.openshift.expose-services=, name=rhosp17/openstack-keystone, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, tcib_managed=true, distribution-scope=public, config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, build-date=2025-11-18T23:45:30Z, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-keystone, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Dec 3 09:09:01 np0005543225 podman[64387]: 2025-12-03 09:09:01.458202464 +0000 UTC m=+0.143677394 container attach 0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, description=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.4, managed_by=tripleo_ansible, batch=17.1_20251118.1, vendor=Red Hat, Inc., architecture=x86_64, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, release=1761123044, build-date=2025-11-18T23:45:30Z, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, distribution-scope=public, com.redhat.component=openstack-keystone-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-keystone, tcib_managed=true, name=rhosp17/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d) Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:01 np0005543225 sshd[64424]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:01 np0005543225 ovs-vsctl[64448]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[64132]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:01 np0005543225 puppet-user[64132]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:01 np0005543225 puppet-user[64132]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:01 np0005543225 puppet-user[64132]: (file & line not available) Dec 3 09:09:01 np0005543225 puppet-user[64132]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:01 np0005543225 puppet-user[64132]: (file & line not available) Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}4a8e3d592743753aad5ff0b34a9abd014297b67688bd498257c3a61d163dd8c9' Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:01 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:01 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Dec 3 09:09:02 np0005543225 puppet-user[64132]: removed in a future realse. Use heat::db::database_connection instead Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[heat_api_wsgi]/ensure: defined content as '{sha256}63c23a972f142aef4c001999d58b5cb122b43aa3aebf0785080bcc6e56385a66' Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/Apache::Vhost[heat_api_wsgi]/Concat[10-heat_api_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_wsgi.conf]/ensure: defined content as '{sha256}bf8a5a6e809c8b7b400c499eb191dcdb11734b590af97d1444b30cf98caabd4e' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}a6064495d47dbdb864435453c6a5c5ad889823989e2c3445cd8889629f705ed0' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:02 np0005543225 puppet-user[63587]: Notice: Applied catalog in 1.36 seconds Dec 3 09:09:02 np0005543225 puppet-user[63587]: Application: Dec 3 09:09:02 np0005543225 puppet-user[63587]: Initial environment: production Dec 3 09:09:02 np0005543225 puppet-user[63587]: Converged environment: production Dec 3 09:09:02 np0005543225 puppet-user[63587]: Run mode: user Dec 3 09:09:02 np0005543225 puppet-user[63587]: Changes: Dec 3 09:09:02 np0005543225 puppet-user[63587]: Total: 89 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Events: Dec 3 09:09:02 np0005543225 puppet-user[63587]: Success: 89 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Total: 89 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Resources: Dec 3 09:09:02 np0005543225 puppet-user[63587]: Skipped: 31 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Changed: 89 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Out of sync: 89 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Total: 331 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Time: Dec 3 09:09:02 np0005543225 puppet-user[63587]: Concat file: 0.00 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Anchor: 0.00 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:02 np0005543225 puppet-user[63587]: Concat fragment: 0.00 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Cron: 0.01 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Package: 0.03 Dec 3 09:09:02 np0005543225 puppet-user[63587]: File: 0.17 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Heat config: 0.81 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Transaction evaluation: 1.35 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Catalog application: 1.36 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Config retrieval: 1.96 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Last run: 1764752942 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Resources: 0.00 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Total: 1.36 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Version: Dec 3 09:09:02 np0005543225 puppet-user[63587]: Config: 1764752938 Dec 3 09:09:02 np0005543225 puppet-user[63587]: Puppet: 7.10.0 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:02 np0005543225 puppet-user[64152]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:02 np0005543225 puppet-user[64152]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:02 np0005543225 puppet-user[64152]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:02 np0005543225 puppet-user[64152]: (file & line not available) Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[heat_api_cfn_wsgi]/ensure: defined content as '{sha256}00dfd79a2e891b11ddd21cb5ce9d8c56f440a274b42eb9e7e9616c7c7e326582' Dec 3 09:09:02 np0005543225 puppet-user[64152]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:02 np0005543225 puppet-user[64152]: (file & line not available) Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/Apache::Vhost[heat_api_cfn_wsgi]/Concat[10-heat_api_cfn_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_cfn_wsgi.conf]/ensure: defined content as '{sha256}7dac0e17c3f221533d2cf9e88bb88db284901ee4a5e428f5f4253dc194c1846f' Dec 3 09:09:02 np0005543225 puppet-user[63673]: Notice: Applied catalog in 1.30 seconds Dec 3 09:09:02 np0005543225 puppet-user[63673]: Application: Dec 3 09:09:02 np0005543225 puppet-user[63673]: Initial environment: production Dec 3 09:09:02 np0005543225 puppet-user[63673]: Converged environment: production Dec 3 09:09:02 np0005543225 puppet-user[63673]: Run mode: user Dec 3 09:09:02 np0005543225 puppet-user[63673]: Changes: Dec 3 09:09:02 np0005543225 puppet-user[63673]: Total: 90 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Events: Dec 3 09:09:02 np0005543225 puppet-user[63673]: Success: 90 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Total: 90 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Resources: Dec 3 09:09:02 np0005543225 puppet-user[63673]: Skipped: 32 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Changed: 90 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Out of sync: 90 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Total: 333 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Time: Dec 3 09:09:02 np0005543225 puppet-user[63673]: Concat file: 0.00 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Anchor: 0.00 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Concat fragment: 0.00 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Cron: 0.01 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Package: 0.03 Dec 3 09:09:02 np0005543225 puppet-user[63673]: File: 0.11 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Heat config: 0.80 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Transaction evaluation: 1.29 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Catalog application: 1.30 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Config retrieval: 1.60 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Last run: 1764752942 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Resources: 0.00 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Total: 1.30 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Version: Dec 3 09:09:02 np0005543225 puppet-user[63673]: Config: 1764752939 Dec 3 09:09:02 np0005543225 puppet-user[63673]: Puppet: 7.10.0 Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.75 seconds Dec 3 09:09:02 np0005543225 puppet-user[64152]: Warning: This parameter is deprecated, please use `internal_proxy`. at ["/etc/puppet/modules/apache/manifests/mod/remoteip.pp", 77]:["/etc/puppet/modules/tripleo/manifests/profile/base/horizon.pp", 103] Dec 3 09:09:02 np0005543225 puppet-user[64152]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Dec 3 09:09:02 np0005543225 systemd[1]: libpod-6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4.scope: Deactivated successfully. Dec 3 09:09:02 np0005543225 systemd[1]: libpod-6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4.scope: Consumed 5.517s CPU time. Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Dec 3 09:09:02 np0005543225 podman[63533]: 2025-12-03 09:09:02.866399956 +0000 UTC m=+6.107707643 container died 6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-heat_api, com.redhat.component=openstack-heat-api-container, distribution-scope=public, tcib_managed=true, io.openshift.expose-services=, build-date=2025-11-19T00:11:00Z, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vcs-type=git, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-heat-api, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, managed_by=tripleo_ansible, release=1761123044, batch=17.1_20251118.1) Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/auth_encryption_key]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_metadata_server_url]/ensure: created Dec 3 09:09:02 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_waitcondition_server_url]/ensure: created Dec 3 09:09:02 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:02 np0005543225 systemd[1]: var-lib-containers-storage-overlay-aa67f286afe5b3ec6665bd2f059ef029c96c37bf450c3d3619bc2d881a5ec019-merged.mount: Deactivated successfully. Dec 3 09:09:02 np0005543225 systemd[1]: libpod-5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452.scope: Deactivated successfully. Dec 3 09:09:02 np0005543225 systemd[1]: libpod-5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452.scope: Consumed 5.164s CPU time. Dec 3 09:09:02 np0005543225 puppet-user[64152]: Warning: Scope(Apache::Vhost[horizon_vhost]): Dec 3 09:09:02 np0005543225 puppet-user[64152]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:02 np0005543225 puppet-user[64152]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:02 np0005543225 puppet-user[64152]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:02 np0005543225 puppet-user[64152]: file names. Dec 3 09:09:02 np0005543225 puppet-user[64152]: Dec 3 09:09:02 np0005543225 puppet-user[64152]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:02 np0005543225 puppet-user[64152]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:02 np0005543225 puppet-user[64152]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/trusts_delegated_roles]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_resources_per_stack]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Warning: Scope(Apache::Vhost[horizon_ssl_vhost]): Dec 3 09:09:03 np0005543225 puppet-user[64152]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:03 np0005543225 puppet-user[64152]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:03 np0005543225 puppet-user[64152]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:03 np0005543225 puppet-user[64152]: file names. Dec 3 09:09:03 np0005543225 puppet-user[64152]: Dec 3 09:09:03 np0005543225 puppet-user[64152]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:03 np0005543225 puppet-user[64152]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:03 np0005543225 puppet-user[64152]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:03 np0005543225 podman[63634]: 2025-12-03 09:09:03.024659296 +0000 UTC m=+5.806913563 container died 5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-heat-api-cfn-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, config_id=tripleo_puppet_step1, vcs-type=git, vendor=Red Hat, Inc., managed_by=tripleo_ansible, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, build-date=2025-11-19T00:10:53Z, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, name=rhosp17/openstack-heat-api-cfn, container_name=container-puppet-heat_api_cfn, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, url=https://www.redhat.com, distribution-scope=public, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.buildah.version=1.41.4, io.openshift.expose-services=, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, release=1761123044) Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/num_engine_workers]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/convergence_engine]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/reauthentication_auth_method]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_nested_stack_depth]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/client_retry_limit]/ensure: created Dec 3 09:09:03 np0005543225 podman[64646]: 2025-12-03 09:09:03.082452489 +0000 UTC m=+0.208173874 container cleanup 6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.component=openstack-heat-api-container, summary=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., container_name=container-puppet-heat_api, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, release=1761123044, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, build-date=2025-11-19T00:11:00Z) Dec 3 09:09:03 np0005543225 systemd[1]: libpod-conmon-6a466a3fbfd3760bf656b847e73d166d6926cb586969bcdd329eb378d5c240e4.scope: Deactivated successfully. Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:03 np0005543225 podman[64666]: 2025-12-03 09:09:03.107206835 +0000 UTC m=+0.076230983 container cleanup 5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, name=rhosp17/openstack-heat-api-cfn, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, vendor=Red Hat, Inc., io.buildah.version=1.41.4, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-heat_api_cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, com.redhat.component=openstack-heat-api-cfn-container, version=17.1.12, build-date=2025-11-19T00:10:53Z, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, maintainer=OpenStack TripleO Team, architecture=x86_64, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, batch=17.1_20251118.1, tcib_managed=true, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 heat-api-cfn) Dec 3 09:09:03 np0005543225 systemd[1]: libpod-conmon-5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452.scope: Deactivated successfully. Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:03 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api_cfn --conmon-pidfile /run/container-puppet-heat_api_cfn.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat_api_cfn --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api_cfn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api_cfn --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api_cfn.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:03 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api --conmon-pidfile /run/container-puppet-heat_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini --env NAME=heat_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.00 seconds Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64411]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:03 np0005543225 puppet-user[64411]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:03 np0005543225 puppet-user[64411]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:03 np0005543225 puppet-user[64411]: (file & line not available) Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:03 np0005543225 systemd[1]: tmp-crun.s4NxvD.mount: Deactivated successfully. Dec 3 09:09:03 np0005543225 systemd[1]: var-lib-containers-storage-overlay-11a964f7e89b2040e02de70094d7f2572a8bd67a3848c3d102474c58628bd0cc-merged.mount: Deactivated successfully. Dec 3 09:09:03 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-5fdf53620437df8f5454d9bb1fdfdc5514a5f4a2cd7ab115ecd997aa97378452-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:03 np0005543225 puppet-user[64411]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:03 np0005543225 puppet-user[64411]: (file & line not available) Dec 3 09:09:03 np0005543225 puppet-user[64411]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.11 seconds Dec 3 09:09:03 np0005543225 puppet-user[64411]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[reset-iscsi-initiator-name]/returns: executed successfully Dec 3 09:09:03 np0005543225 puppet-user[64411]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/File[/etc/iscsi/.initiator_reset]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64411]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[sync-iqn-to-host]/returns: executed successfully Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Remoteip/File[remoteip.conf]/ensure: defined content as '{sha256}9c8d4355af8c0547dc87c380e06a19f272a0bd3fac83afce5f8eb116cf574c2e' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon/File[/etc/openstack-dashboard/local_settings.d]/mode: mode changed '0750' to '0755' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon]/mode: mode changed '0750' to '0751' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon/horizon.log]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}751443053f8eb77319d9c761098b6f7bbf2bf0cd179f85af05b002ba8ac0e918' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:03 np0005543225 puppet-user[64436]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:03 np0005543225 puppet-user[64436]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:03 np0005543225 puppet-user[64436]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:03 np0005543225 puppet-user[64436]: (file & line not available) Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Remoteip/Apache::Mod[remoteip]/File[remoteip.load]/ensure: defined content as '{sha256}3977211787f6c6bf5629e4156b32d1dc95c37bc640452d0027b2bc9b1ec9f2d7' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon/Concat[/etc/openstack-dashboard/local_settings]/File[/etc/openstack-dashboard/local_settings]/content: content changed '{sha256}bb0e13a0afbf37de0b90c300eea7d75d3db826936a1effc1acf58205f154b6f2' to '{sha256}1906da1472f70aacac213f4c59658958b25a9eec48f9f8ae0d61aa6f2cb8c8ba' Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/etc/httpd/conf.d/openstack-dashboard.conf]/content: content changed '{sha256}2674ec0a2b4f3412930e918216e5698d5bc877be4364105136866cad3f2ae4bb' to '{sha256}5c3c01834d94a99528a118d4a02978297ac0bf0250e0729c7e4bbd47d4865680' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Alias/File[alias.conf]/ensure: defined content as '{sha256}8c17a7de4a27d92b2aca6b156dca9e26b9e0bf31b8cc43f63c971aeed09d4e54' Dec 3 09:09:03 np0005543225 podman[64892]: 2025-12-03 09:09:03.566162813 +0000 UTC m=+0.071523098 container create d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.12, description=Red Hat OpenStack Platform 17.1 memcached, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-memcached, container_name=container-puppet-memcached, tcib_managed=true, com.redhat.component=openstack-memcached-container, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., release=1761123044, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, managed_by=tripleo_ansible, url=https://www.redhat.com, io.openshift.expose-services=) Dec 3 09:09:03 np0005543225 puppet-user[64436]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:03 np0005543225 puppet-user[64436]: (file & line not available) Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon::Dashboards::Heat/Concat[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/File[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/ensure: defined content as '{sha256}dd44da5c856beb5e53df88fc72180a79669b73c9c04d487b5033290279692113' Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/content: content changed '{sha256}30de7bbf440460cde78da0e2cf1cab2404921ef0b0e926f5ebaaf973dc4252c5' to '{sha256}838e0d57b7536ffc538afd2e4d916f26ccb29380c13563d0f1ef51d676112c34' Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:03 np0005543225 systemd[1]: Started libpod-conmon-d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c.scope. Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/group: group changed 'root' to 'apache' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/mode: mode changed '0644' to '0640' Dec 3 09:09:03 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:03 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/af2ef5723a1dca4dc6ef97c162345076536a9e7b0e1142f00bff59f2a957ceb9/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache::Mod::Alias/Apache::Mod[alias]/File[alias.load]/ensure: defined content as '{sha256}824016275330b45fd8bd04b07792de5f9aaa337f8272bfc01c5b57bb515fc9b4' Dec 3 09:09:03 np0005543225 podman[64892]: 2025-12-03 09:09:03.626589637 +0000 UTC m=+0.131949942 container init d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, description=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, com.redhat.component=openstack-memcached-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, release=1761123044, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 memcached, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-memcached, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached) Dec 3 09:09:03 np0005543225 podman[64892]: 2025-12-03 09:09:03.530914237 +0000 UTC m=+0.036274542 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 09:09:03 np0005543225 podman[64892]: 2025-12-03 09:09:03.635917284 +0000 UTC m=+0.141277569 container start d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, vendor=Red Hat, Inc., version=17.1.12, vcs-type=git, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, name=rhosp17/openstack-memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-memcached, managed_by=tripleo_ansible, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:49Z, config_id=tripleo_puppet_step1, com.redhat.component=openstack-memcached-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team) Dec 3 09:09:03 np0005543225 podman[64892]: 2025-12-03 09:09:03.636133089 +0000 UTC m=+0.141493444 container attach d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, io.openshift.expose-services=, name=rhosp17/openstack-memcached, url=https://www.redhat.com, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-memcached, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, build-date=2025-11-18T22:49:49Z, io.buildah.version=1.41.4, com.redhat.component=openstack-memcached-container, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_vhost]/Concat[10-horizon_vhost.conf]/File[/etc/httpd/conf.d/10-horizon_vhost.conf]/ensure: defined content as '{sha256}f4ba49d48535e1cec6a0cd56798d4cc4101169eb4938e2084316f387b7a0fbb0' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_ssl_vhost]/Concat[15-horizon_ssl_vhost.conf]/File[/etc/httpd/conf.d/15-horizon_ssl_vhost.conf]/ensure: defined content as '{sha256}dc220f979ba2fc82a7576d4855ed29f4a3117bffb2a26c0c4e932a5a8418e43b' Dec 3 09:09:03 np0005543225 puppet-user[64152]: Notice: Applied catalog in 0.44 seconds Dec 3 09:09:03 np0005543225 puppet-user[64152]: Application: Dec 3 09:09:03 np0005543225 puppet-user[64152]: Initial environment: production Dec 3 09:09:03 np0005543225 puppet-user[64152]: Converged environment: production Dec 3 09:09:03 np0005543225 puppet-user[64152]: Run mode: user Dec 3 09:09:03 np0005543225 puppet-user[64152]: Changes: Dec 3 09:09:03 np0005543225 puppet-user[64152]: Total: 50 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Events: Dec 3 09:09:03 np0005543225 puppet-user[64152]: Success: 50 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Total: 50 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Resources: Dec 3 09:09:03 np0005543225 puppet-user[64152]: Skipped: 33 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Changed: 48 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Out of sync: 48 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Total: 140 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Time: Dec 3 09:09:03 np0005543225 puppet-user[64152]: Concat file: 0.00 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Concat fragment: 0.00 Dec 3 09:09:03 np0005543225 puppet-user[64152]: File: 0.24 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Transaction evaluation: 0.43 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Catalog application: 0.44 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Config retrieval: 1.10 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Last run: 1764752943 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Total: 0.44 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Version: Dec 3 09:09:03 np0005543225 puppet-user[64152]: Config: 1764752942 Dec 3 09:09:03 np0005543225 puppet-user[64152]: Puppet: 7.10.0 Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64411]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Augeas[chap_algs in /etc/iscsi/iscsid.conf]/returns: executed successfully Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64411]: Notice: Applied catalog in 0.48 seconds Dec 3 09:09:03 np0005543225 puppet-user[64411]: Application: Dec 3 09:09:03 np0005543225 puppet-user[64411]: Initial environment: production Dec 3 09:09:03 np0005543225 puppet-user[64411]: Converged environment: production Dec 3 09:09:03 np0005543225 puppet-user[64411]: Run mode: user Dec 3 09:09:03 np0005543225 puppet-user[64411]: Changes: Dec 3 09:09:03 np0005543225 puppet-user[64411]: Total: 4 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Events: Dec 3 09:09:03 np0005543225 puppet-user[64411]: Success: 4 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Total: 4 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Resources: Dec 3 09:09:03 np0005543225 puppet-user[64411]: Changed: 4 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Out of sync: 4 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Skipped: 8 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Total: 13 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Time: Dec 3 09:09:03 np0005543225 puppet-user[64411]: File: 0.00 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Exec: 0.05 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Config retrieval: 0.14 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Augeas: 0.41 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Transaction evaluation: 0.48 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Catalog application: 0.48 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Last run: 1764752943 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Total: 0.49 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Version: Dec 3 09:09:03 np0005543225 puppet-user[64411]: Config: 1764752943 Dec 3 09:09:03 np0005543225 puppet-user[64411]: Puppet: 7.10.0 Dec 3 09:09:03 np0005543225 puppet-user[64436]: Notice: Accepting previously invalid value for target type 'Enum['sql', 'template']' Dec 3 09:09:03 np0005543225 puppet-user[64436]: Warning: Scope(Class[Keystone]): The database_connection parameter is deprecated and will be \ Dec 3 09:09:03 np0005543225 puppet-user[64436]: removed in a future realse. Use keystone::db::database_connection instead Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Dec 3 09:09:03 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Dec 3 09:09:04 np0005543225 puppet-user[64132]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:04 np0005543225 puppet-user[64132]: Notice: Applied catalog in 1.40 seconds Dec 3 09:09:04 np0005543225 puppet-user[64132]: Application: Dec 3 09:09:04 np0005543225 puppet-user[64132]: Initial environment: production Dec 3 09:09:04 np0005543225 puppet-user[64132]: Converged environment: production Dec 3 09:09:04 np0005543225 puppet-user[64132]: Run mode: user Dec 3 09:09:04 np0005543225 puppet-user[64132]: Changes: Dec 3 09:09:04 np0005543225 puppet-user[64132]: Total: 61 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Events: Dec 3 09:09:04 np0005543225 puppet-user[64132]: Success: 61 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Total: 61 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Resources: Dec 3 09:09:04 np0005543225 puppet-user[64132]: Skipped: 21 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Changed: 61 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Out of sync: 61 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Total: 259 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Time: Dec 3 09:09:04 np0005543225 puppet-user[64132]: Anchor: 0.00 Dec 3 09:09:04 np0005543225 puppet-user[64132]: File: 0.00 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Cron: 0.01 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Augeas: 0.02 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Package: 0.03 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Config retrieval: 0.85 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Heat config: 1.20 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Transaction evaluation: 1.39 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Catalog application: 1.40 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Last run: 1764752944 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Resources: 0.00 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Total: 1.40 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Version: Dec 3 09:09:04 np0005543225 puppet-user[64132]: Config: 1764752941 Dec 3 09:09:04 np0005543225 puppet-user[64132]: Puppet: 7.10.0 Dec 3 09:09:04 np0005543225 systemd[1]: libpod-fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e.scope: Deactivated successfully. Dec 3 09:09:04 np0005543225 systemd[1]: libpod-fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e.scope: Consumed 2.657s CPU time. Dec 3 09:09:04 np0005543225 podman[64338]: 2025-12-03 09:09:04.126806608 +0000 UTC m=+2.968299027 container died fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.12, architecture=x86_64, config_id=tripleo_puppet_step1, build-date=2025-11-18T23:44:13Z, container_name=container-puppet-iscsid, batch=17.1_20251118.1, distribution-scope=public, tcib_managed=true, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, com.redhat.component=openstack-iscsid-container, name=rhosp17/openstack-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid) Dec 3 09:09:04 np0005543225 systemd[1]: var-lib-containers-storage-overlay-f65f732587863bc8bd5bdb1137df20c9073ee340731d36f854251a9a67255891-merged.mount: Deactivated successfully. Dec 3 09:09:04 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:04 np0005543225 systemd[1]: libpod-4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3.scope: Deactivated successfully. Dec 3 09:09:04 np0005543225 systemd[1]: libpod-4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3.scope: Consumed 3.823s CPU time. Dec 3 09:09:04 np0005543225 podman[64104]: 2025-12-03 09:09:04.256665904 +0000 UTC m=+4.340775063 container died 4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, url=https://www.redhat.com, name=rhosp17/openstack-horizon, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 horizon, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, vendor=Red Hat, Inc., container_name=container-puppet-horizon, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, distribution-scope=public, release=1761123044, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T23:41:37Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, com.redhat.component=openstack-horizon-container) Dec 3 09:09:04 np0005543225 podman[64980]: 2025-12-03 09:09:04.315525716 +0000 UTC m=+0.178449336 container cleanup fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, build-date=2025-11-18T23:44:13Z, description=Red Hat OpenStack Platform 17.1 iscsid, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-iscsid, distribution-scope=public, com.redhat.component=openstack-iscsid-container, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.12, managed_by=tripleo_ansible, io.openshift.expose-services=, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.4, architecture=x86_64, container_name=container-puppet-iscsid) Dec 3 09:09:04 np0005543225 systemd[1]: libpod-conmon-fe9c699e60f9c9a6ab757430c3c885c16f7094994f51d09f91c12aefe933461e.scope: Deactivated successfully. Dec 3 09:09:04 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-iscsid --conmon-pidfile /run/container-puppet-iscsid.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,iscsid_config --env NAME=iscsid --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::iscsid#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-iscsid --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-iscsid.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/iscsi:/tmp/iscsi.host:z --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Dec 3 09:09:04 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:04 np0005543225 systemd[1]: var-lib-containers-storage-overlay-3afca6ff6c9885e38264c14dc1a8f288646b8c924710b172adaaa58805e9b49a-merged.mount: Deactivated successfully. Dec 3 09:09:04 np0005543225 podman[65005]: 2025-12-03 09:09:04.500143373 +0000 UTC m=+0.232760646 container cleanup 4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, architecture=x86_64, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, io.openshift.expose-services=, io.buildah.version=1.41.4, tcib_managed=true, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_puppet_step1, com.redhat.component=openstack-horizon-container, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 horizon, build-date=2025-11-18T23:41:37Z, version=17.1.12, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, name=rhosp17/openstack-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public) Dec 3 09:09:04 np0005543225 systemd[1]: libpod-conmon-4a024834816ffdf94b91eeb147e2c02a39c0bdb24f702f3ee0d25d09678ffcb3.scope: Deactivated successfully. Dec 3 09:09:04 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-horizon --conmon-pidfile /run/container-puppet-horizon.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,horizon_config --env NAME=horizon --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::horizon#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-horizon --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-horizon.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Dec 3 09:09:04 np0005543225 podman[65087]: 2025-12-03 09:09:04.570954093 +0000 UTC m=+0.087234516 container create 4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, io.buildah.version=1.41.4, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, vendor=Red Hat, Inc., tcib_managed=true, vcs-type=git, com.redhat.component=openstack-manila-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, name=rhosp17/openstack-manila-api, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, container_name=container-puppet-manila, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, distribution-scope=public, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, summary=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:21:10Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team) Dec 3 09:09:04 np0005543225 systemd[1]: Started libpod-conmon-4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51.scope. Dec 3 09:09:04 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:04 np0005543225 podman[65087]: 2025-12-03 09:09:04.522862997 +0000 UTC m=+0.039143440 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Dec 3 09:09:04 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e72a275e3fcddea4d40647780df82467222633a2e4fcad326832238e4d5fc947/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:04 np0005543225 podman[65087]: 2025-12-03 09:09:04.630885162 +0000 UTC m=+0.147165585 container init 4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.component=openstack-manila-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, name=rhosp17/openstack-manila-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, build-date=2025-11-19T00:21:10Z, io.openshift.expose-services=, container_name=container-puppet-manila, version=17.1.12, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, architecture=x86_64, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, batch=17.1_20251118.1, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, tcib_managed=true, managed_by=tripleo_ansible, vcs-type=git) Dec 3 09:09:04 np0005543225 systemd[1]: libpod-539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01.scope: Deactivated successfully. Dec 3 09:09:04 np0005543225 systemd[1]: libpod-539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01.scope: Consumed 4.301s CPU time. Dec 3 09:09:04 np0005543225 podman[65087]: 2025-12-03 09:09:04.63907949 +0000 UTC m=+0.155359913 container start 4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, vcs-type=git, description=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, summary=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.buildah.version=1.41.4, batch=17.1_20251118.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, container_name=container-puppet-manila, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, com.redhat.component=openstack-manila-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, build-date=2025-11-19T00:21:10Z, distribution-scope=public, name=rhosp17/openstack-manila-api, io.openshift.expose-services=, config_id=tripleo_puppet_step1, tcib_managed=true, maintainer=OpenStack TripleO Team) Dec 3 09:09:04 np0005543225 podman[65087]: 2025-12-03 09:09:04.639234044 +0000 UTC m=+0.155514467 container attach 4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, tcib_managed=true, architecture=x86_64, io.openshift.expose-services=, batch=17.1_20251118.1, build-date=2025-11-19T00:21:10Z, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 manila-api, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, version=17.1.12, com.redhat.component=openstack-manila-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, vcs-type=git, container_name=container-puppet-manila, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-manila-api) Dec 3 09:09:04 np0005543225 podman[64076]: 2025-12-03 09:09:04.640474188 +0000 UTC m=+4.827080336 container died 539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-heat-api-container, io.openshift.expose-services=, batch=17.1_20251118.1, io.buildah.version=1.41.4, release=1761123044, architecture=x86_64, maintainer=OpenStack TripleO Team, container_name=container-puppet-heat, build-date=2025-11-19T00:11:00Z, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vendor=Red Hat, Inc., tcib_managed=true, description=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, managed_by=tripleo_ansible, name=rhosp17/openstack-heat-api, url=https://www.redhat.com, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Dec 3 09:09:04 np0005543225 puppet-user[64436]: Warning: Scope(Apache::Vhost[keystone_wsgi]): Dec 3 09:09:04 np0005543225 puppet-user[64436]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:04 np0005543225 puppet-user[64436]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:04 np0005543225 puppet-user[64436]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:04 np0005543225 puppet-user[64436]: file names. Dec 3 09:09:04 np0005543225 puppet-user[64436]: Dec 3 09:09:04 np0005543225 puppet-user[64436]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:04 np0005543225 puppet-user[64436]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:04 np0005543225 puppet-user[64436]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:04 np0005543225 podman[65172]: 2025-12-03 09:09:04.71784875 +0000 UTC m=+0.065404256 container cleanup 539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01 (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, batch=17.1_20251118.1, container_name=container-puppet-heat, com.redhat.component=openstack-heat-api-container, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, io.buildah.version=1.41.4, name=rhosp17/openstack-heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, url=https://www.redhat.com, build-date=2025-11-19T00:11:00Z, summary=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, vcs-type=git, distribution-scope=public, release=1761123044) Dec 3 09:09:04 np0005543225 systemd[1]: libpod-conmon-539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01.scope: Deactivated successfully. Dec 3 09:09:04 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat --conmon-pidfile /run/container-puppet-heat.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::engine#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 09:09:04 np0005543225 puppet-user[64436]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.43 seconds Dec 3 09:09:04 np0005543225 podman[65266]: 2025-12-03 09:09:04.890898891 +0000 UTC m=+0.030147171 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:09:04 np0005543225 podman[65231]: 2025-12-03 09:09:04.902457398 +0000 UTC m=+0.131857639 container create cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, com.redhat.component=openstack-qdrouterd-container, tcib_managed=true, container_name=container-puppet-metrics_qdr, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, distribution-scope=public, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., name=rhosp17/openstack-qdrouterd, managed_by=tripleo_ansible, url=https://www.redhat.com, config_id=tripleo_puppet_step1, release=1761123044, architecture=x86_64, build-date=2025-11-18T22:49:46Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:04 np0005543225 podman[65231]: 2025-12-03 09:09:04.818459579 +0000 UTC m=+0.047859830 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:04 np0005543225 systemd[1]: Started libpod-conmon-cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f.scope. Dec 3 09:09:04 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:04 np0005543225 podman[65266]: 2025-12-03 09:09:04.938183046 +0000 UTC m=+0.077431326 container create ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:51:13Z, container_name=container-puppet-mysql, summary=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, distribution-scope=public, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, com.redhat.component=openstack-mariadb-container, name=rhosp17/openstack-mariadb, vendor=Red Hat, Inc., tcib_managed=true, description=Red Hat OpenStack Platform 17.1 mariadb) Dec 3 09:09:04 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/729c90e352bbd7f87a283a7c09b6b5141389b5e27d09ac65bf0ae9bd48088e3e/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:04 np0005543225 systemd[1]: Started libpod-conmon-ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428.scope. Dec 3 09:09:04 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:04 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/69545e9775297658af302aa9ed4a45c6d72379aafad676a33f5955f585b7b3fc/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:04 np0005543225 podman[65266]: 2025-12-03 09:09:04.991594863 +0000 UTC m=+0.130843133 container init ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, maintainer=OpenStack TripleO Team, build-date=2025-11-18T22:51:13Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, url=https://www.redhat.com, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, container_name=container-puppet-mysql, vendor=Red Hat, Inc., distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-type=git, com.redhat.component=openstack-mariadb-container, architecture=x86_64, name=rhosp17/openstack-mariadb, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12) Dec 3 09:09:04 np0005543225 podman[65231]: 2025-12-03 09:09:04.996324579 +0000 UTC m=+0.225724840 container init cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, vendor=Red Hat, Inc., release=1761123044, maintainer=OpenStack TripleO Team, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, vcs-type=git, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, url=https://www.redhat.com, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, container_name=container-puppet-metrics_qdr, build-date=2025-11-18T22:49:46Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:09:05 np0005543225 podman[65231]: 2025-12-03 09:09:05.004759943 +0000 UTC m=+0.234160204 container start cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, io.openshift.expose-services=, build-date=2025-11-18T22:49:46Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, com.redhat.component=openstack-qdrouterd-container, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1, tcib_managed=true, container_name=container-puppet-metrics_qdr, maintainer=OpenStack TripleO Team, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, managed_by=tripleo_ansible) Dec 3 09:09:05 np0005543225 podman[65231]: 2025-12-03 09:09:05.0050304 +0000 UTC m=+0.234430661 container attach cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, build-date=2025-11-18T22:49:46Z, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, container_name=container-puppet-metrics_qdr, name=rhosp17/openstack-qdrouterd, batch=17.1_20251118.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-qdrouterd-container, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, io.openshift.expose-services=, release=1761123044) Dec 3 09:09:05 np0005543225 podman[65266]: 2025-12-03 09:09:05.049235522 +0000 UTC m=+0.188483782 container start ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, name=rhosp17/openstack-mariadb, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, batch=17.1_20251118.1, tcib_managed=true, io.openshift.expose-services=, release=1761123044, managed_by=tripleo_ansible, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, com.redhat.component=openstack-mariadb-container, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:51:13Z, container_name=container-puppet-mysql) Dec 3 09:09:05 np0005543225 podman[65266]: 2025-12-03 09:09:05.050357032 +0000 UTC m=+0.189605332 container attach ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, version=17.1.12, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:51:13Z, managed_by=tripleo_ansible, name=rhosp17/openstack-mariadb, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-mariadb-container, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, url=https://www.redhat.com, container_name=container-puppet-mysql, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, release=1761123044, architecture=x86_64) Dec 3 09:09:05 np0005543225 podman[65342]: 2025-12-03 09:09:05.173867399 +0000 UTC m=+0.125963783 container create 32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, build-date=2025-11-19T00:23:27Z, description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=, version=17.1.12, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, vcs-type=git, com.redhat.component=openstack-neutron-server-container, container_name=container-puppet-neutron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-neutron-server, distribution-scope=public, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server) Dec 3 09:09:05 np0005543225 systemd[1]: Started libpod-conmon-32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e.scope. Dec 3 09:09:05 np0005543225 podman[65342]: 2025-12-03 09:09:05.101045247 +0000 UTC m=+0.053141671 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Dec 3 09:09:05 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:05 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9ea2cb49f97c616684616b03a2809444c83e8486e244e56abce19c2e597d1a29/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:05 np0005543225 systemd[1]: var-lib-containers-storage-overlay-c232b2b220c3c786ac3abf804c22dfd88847d01f228ec662dfd7020912b09089-merged.mount: Deactivated successfully. Dec 3 09:09:05 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-539620f0ecbcbb3dbd8123a2c9da1228864715b2bff4edc731123c00f3e0ee01-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:05 np0005543225 podman[65342]: 2025-12-03 09:09:05.227445721 +0000 UTC m=+0.179542115 container init 32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, build-date=2025-11-19T00:23:27Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, distribution-scope=public, vcs-type=git, managed_by=tripleo_ansible, vendor=Red Hat, Inc., release=1761123044, container_name=container-puppet-neutron, batch=17.1_20251118.1, url=https://www.redhat.com, version=17.1.12, description=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:09:05 np0005543225 podman[65342]: 2025-12-03 09:09:05.234154178 +0000 UTC m=+0.186250572 container start 32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 neutron-server, summary=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, container_name=container-puppet-neutron, io.buildah.version=1.41.4, version=17.1.12, tcib_managed=true, vcs-type=git, build-date=2025-11-19T00:23:27Z, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, name=rhosp17/openstack-neutron-server, maintainer=OpenStack TripleO Team, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, managed_by=tripleo_ansible, io.openshift.expose-services=, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, url=https://www.redhat.com, distribution-scope=public, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:05 np0005543225 podman[65342]: 2025-12-03 09:09:05.234373845 +0000 UTC m=+0.186470229 container attach 32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, vcs-type=git, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, vendor=Red Hat, Inc., url=https://www.redhat.com, name=rhosp17/openstack-neutron-server, architecture=x86_64, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, container_name=container-puppet-neutron, distribution-scope=public, io.buildah.version=1.41.4, com.redhat.component=openstack-neutron-server-container, build-date=2025-11-19T00:23:27Z, description=Red Hat OpenStack Platform 17.1 neutron-server, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c) Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[token/expiration]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/enable]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/certfile]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/keyfile]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_certs]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_key]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/cert_subject]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/driver]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/template_file]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[token/provider]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[DEFAULT/notification_format]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/0]/ensure: defined content as '{sha256}d1c4eb8d9040e59a19e330d34169ac628cb0ee934df4ba79279dbfd52693599d' Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/1]/ensure: defined content as '{sha256}4a50a997f4057a50b53effbb692e9fd341a299a275a2a6a57678669bba4b3297' Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/0]/ensure: defined content as '{sha256}3c93411564ad8d5d76bfa8c1edbc8d75fefded34037ac674de49370afba1cd51' Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/1]/ensure: defined content as '{sha256}c31f5846df6ac935ec9e7bcb47caf259fe4e469f542c5810edad79b5f0d21399' Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/key_repository]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[token/revoke_by_id]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/max_active_keys]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Keystone_config[credential/key_repository]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Cron::Trust_flush/Cron[keystone-manage trust_flush]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64923]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:05 np0005543225 puppet-user[64923]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:05 np0005543225 puppet-user[64923]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:05 np0005543225 puppet-user[64923]: (file & line not available) Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:05 np0005543225 puppet-user[64923]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:05 np0005543225 puppet-user[64923]: (file & line not available) Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend_argument]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/enabled]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64923]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.09 seconds Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/memcache_servers]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64923]: Notice: /Stage[main]/Memcached/File[/etc/sysconfig/memcached]/content: content changed '{sha256}31f7d20fad86bdd2bc5692619928af8785dc0e9f858863aeece67cff0e4edfd2' to '{sha256}1683d2179da2d1034e6baa7aa85c57f61b07baad50072db79ecd8cb5b32f5ebb' Dec 3 09:09:05 np0005543225 puppet-user[64923]: Notice: Applied catalog in 0.02 seconds Dec 3 09:09:05 np0005543225 puppet-user[64923]: Application: Dec 3 09:09:05 np0005543225 puppet-user[64923]: Initial environment: production Dec 3 09:09:05 np0005543225 puppet-user[64923]: Converged environment: production Dec 3 09:09:05 np0005543225 puppet-user[64923]: Run mode: user Dec 3 09:09:05 np0005543225 puppet-user[64923]: Changes: Dec 3 09:09:05 np0005543225 puppet-user[64923]: Total: 1 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Events: Dec 3 09:09:05 np0005543225 puppet-user[64923]: Success: 1 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Total: 1 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Resources: Dec 3 09:09:05 np0005543225 puppet-user[64923]: Changed: 1 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Out of sync: 1 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Skipped: 9 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Total: 10 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Time: Dec 3 09:09:05 np0005543225 puppet-user[64923]: File: 0.01 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Transaction evaluation: 0.01 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Catalog application: 0.02 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Config retrieval: 0.13 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Last run: 1764752945 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Total: 0.02 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Version: Dec 3 09:09:05 np0005543225 puppet-user[64923]: Config: 1764752945 Dec 3 09:09:05 np0005543225 puppet-user[64923]: Puppet: 7.10.0 Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/tls_enabled]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/debug]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Policy/Oslo::Policy[keystone_config]/Keystone_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/connection]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/max_retries]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/db_max_retries]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Oslo::Middleware[keystone_config]/Keystone_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Default[keystone_config]/Keystone_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:05 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:06 np0005543225 systemd[1]: libpod-d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c.scope: Deactivated successfully. Dec 3 09:09:06 np0005543225 systemd[1]: libpod-d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c.scope: Consumed 2.262s CPU time. Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/topics]/ensure: created Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:06 np0005543225 podman[65482]: 2025-12-03 09:09:06.091949639 +0000 UTC m=+0.072306220 container died d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:49Z, release=1761123044, batch=17.1_20251118.1, name=rhosp17/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, container_name=container-puppet-memcached) Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}875243f2e37348f9a07a104dbdf95bb6d744cfa9d436685eabe6d2703419a2e5' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:06 np0005543225 podman[65482]: 2025-12-03 09:09:06.139047748 +0000 UTC m=+0.119404319 container cleanup d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, vendor=Red Hat, Inc., distribution-scope=public, io.openshift.expose-services=, release=1761123044, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, name=rhosp17/openstack-memcached, build-date=2025-11-18T22:49:49Z, architecture=x86_64, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-memcached-container, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached) Dec 3 09:09:06 np0005543225 systemd[1]: libpod-conmon-d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c.scope: Deactivated successfully. Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:06 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-memcached --conmon-pidfile /run/container-puppet-memcached.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=memcached --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::memcached#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-memcached --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-memcached.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[/var/www/cgi-bin/keystone]/group: group changed 'root' to 'keystone' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[keystone_wsgi]/ensure: defined content as '{sha256}55e95baab868583f1b6646e2dcc61edb7f403991f97d4397478e9a9dd3e7d1f2' Dec 3 09:09:06 np0005543225 systemd[1]: tmp-crun.9FDdoq.mount: Deactivated successfully. Dec 3 09:09:06 np0005543225 systemd[1]: var-lib-containers-storage-overlay-af2ef5723a1dca4dc6ef97c162345076536a9e7b0e1142f00bff59f2a957ceb9-merged.mount: Deactivated successfully. Dec 3 09:09:06 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d372ec97a3b7b17670ed5eade9aedf7d26576a6874fab94c23b33ce0177a652c-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_mellon.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_openidc.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_gssapi.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_mellon.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_openidc.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/Apache::Vhost[keystone_wsgi]/Concat[10-keystone_wsgi.conf]/File[/etc/httpd/conf.d/10-keystone_wsgi.conf]/ensure: defined content as '{sha256}1b35bba8a1a4d9d464754346deaf240170af13ac2c41dd58180ce6fac56c8aeb' Dec 3 09:09:06 np0005543225 puppet-user[64436]: Notice: Applied catalog in 1.25 seconds Dec 3 09:09:06 np0005543225 puppet-user[64436]: Application: Dec 3 09:09:06 np0005543225 puppet-user[64436]: Initial environment: production Dec 3 09:09:06 np0005543225 puppet-user[64436]: Converged environment: production Dec 3 09:09:06 np0005543225 puppet-user[64436]: Run mode: user Dec 3 09:09:06 np0005543225 puppet-user[64436]: Changes: Dec 3 09:09:06 np0005543225 puppet-user[64436]: Total: 88 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Events: Dec 3 09:09:06 np0005543225 puppet-user[64436]: Success: 88 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Total: 88 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Resources: Dec 3 09:09:06 np0005543225 puppet-user[64436]: Skipped: 32 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Changed: 88 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Out of sync: 88 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Total: 280 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Time: Dec 3 09:09:06 np0005543225 puppet-user[64436]: Concat file: 0.00 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Concat fragment: 0.00 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Augeas: 0.02 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Package: 0.04 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Cron: 0.04 Dec 3 09:09:06 np0005543225 puppet-user[64436]: File: 0.17 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Keystone config: 0.73 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Transaction evaluation: 1.24 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Catalog application: 1.25 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Config retrieval: 1.69 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Last run: 1764752946 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Resources: 0.00 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Total: 1.25 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Version: Dec 3 09:09:06 np0005543225 puppet-user[64436]: Config: 1764752943 Dec 3 09:09:06 np0005543225 puppet-user[64436]: Puppet: 7.10.0 Dec 3 09:09:06 np0005543225 podman[65566]: 2025-12-03 09:09:06.529746084 +0000 UTC m=+0.069986118 container create 0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, distribution-scope=public, name=rhosp17/openstack-nova-api, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vendor=Red Hat, Inc., architecture=x86_64, container_name=container-puppet-nova, vcs-type=git, com.redhat.component=openstack-nova-api-container, version=17.1.12, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, build-date=2025-11-19T00:34:57Z, managed_by=tripleo_ansible, url=https://www.redhat.com) Dec 3 09:09:06 np0005543225 systemd[1]: Started libpod-conmon-0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9.scope. Dec 3 09:09:06 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:06 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/328236d374814997d43e0986cd4a0f963cffe19ec558157dc33c7fa08fc847e7/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:06 np0005543225 podman[65566]: 2025-12-03 09:09:06.590696261 +0000 UTC m=+0.130936305 container init 0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, distribution-scope=public, name=rhosp17/openstack-nova-api, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.12, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, container_name=container-puppet-nova, build-date=2025-11-19T00:34:57Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, vcs-type=git, managed_by=tripleo_ansible, batch=17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Dec 3 09:09:06 np0005543225 podman[65566]: 2025-12-03 09:09:06.598120778 +0000 UTC m=+0.138360832 container start 0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-api, build-date=2025-11-19T00:34:57Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp17/openstack-nova-api, tcib_managed=true, release=1761123044, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, container_name=container-puppet-nova, managed_by=tripleo_ansible, batch=17.1_20251118.1, com.redhat.component=openstack-nova-api-container, config_id=tripleo_puppet_step1, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com) Dec 3 09:09:06 np0005543225 podman[65566]: 2025-12-03 09:09:06.598388795 +0000 UTC m=+0.138628869 container attach 0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, container_name=container-puppet-nova, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, distribution-scope=public, tcib_managed=true, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, batch=17.1_20251118.1, vendor=Red Hat, Inc., version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, managed_by=tripleo_ansible, vcs-type=git, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-nova-api, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, release=1761123044, build-date=2025-11-19T00:34:57Z) Dec 3 09:09:06 np0005543225 podman[65566]: 2025-12-03 09:09:06.498755822 +0000 UTC m=+0.038995906 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 09:09:06 np0005543225 puppet-user[65200]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:06 np0005543225 puppet-user[65200]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:06 np0005543225 puppet-user[65200]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:06 np0005543225 puppet-user[65200]: (file & line not available) Dec 3 09:09:06 np0005543225 puppet-user[65200]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:06 np0005543225 puppet-user[65200]: (file & line not available) Dec 3 09:09:06 np0005543225 puppet-user[65200]: Warning: Scope(Class[Manila]): The sql_connection parameter is deprecated and will be \ Dec 3 09:09:06 np0005543225 puppet-user[65200]: removed in a future realse. Use manila::db::database_connection instead Dec 3 09:09:06 np0005543225 puppet-user[65354]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:06 np0005543225 puppet-user[65354]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:06 np0005543225 puppet-user[65354]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:06 np0005543225 puppet-user[65354]: (file & line not available) Dec 3 09:09:07 np0005543225 puppet-user[65379]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Dec 3 09:09:07 np0005543225 puppet-user[65354]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:07 np0005543225 puppet-user[65354]: (file & line not available) Dec 3 09:09:07 np0005543225 ovs-vsctl[65763]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: Accepting previously invalid value for target type 'Integer' Dec 3 09:09:07 np0005543225 systemd[1]: libpod-0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b.scope: Deactivated successfully. Dec 3 09:09:07 np0005543225 systemd[1]: libpod-0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b.scope: Consumed 5.305s CPU time. Dec 3 09:09:07 np0005543225 podman[64387]: 2025-12-03 09:09:07.086014524 +0000 UTC m=+5.771489464 container died 0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, container_name=container-puppet-keystone, io.buildah.version=1.41.4, build-date=2025-11-18T23:45:30Z, name=rhosp17/openstack-keystone, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, io.openshift.expose-services=, config_id=tripleo_puppet_step1, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, distribution-scope=public, com.redhat.component=openstack-keystone-container, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone) Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.12 seconds Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/owner: owner changed 'qdrouterd' to 'root' Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/group: group changed 'qdrouterd' to 'root' Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/mode: mode changed '0700' to '0755' Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: /Stage[main]/Qdr::Config/File[/etc/qpid-dispatch/ssl]/ensure: created Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: /Stage[main]/Qdr::Config/File[qdrouterd.conf]/content: content changed '{sha256}89e10d8896247f992c5f0baf027c25a8ca5d0441be46d8859d9db2067ea74cd3' to '{sha256}556a2bcaee5c15d851ee3b38b5dde9ab60a57a86b291bcc013744ad6c133a941' Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd]/ensure: created Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd/metrics_qdr.log]/ensure: created Dec 3 09:09:07 np0005543225 puppet-user[65354]: Notice: Applied catalog in 0.03 seconds Dec 3 09:09:07 np0005543225 puppet-user[65354]: Application: Dec 3 09:09:07 np0005543225 puppet-user[65354]: Initial environment: production Dec 3 09:09:07 np0005543225 puppet-user[65354]: Converged environment: production Dec 3 09:09:07 np0005543225 puppet-user[65354]: Run mode: user Dec 3 09:09:07 np0005543225 puppet-user[65354]: Changes: Dec 3 09:09:07 np0005543225 puppet-user[65354]: Total: 7 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Events: Dec 3 09:09:07 np0005543225 puppet-user[65354]: Success: 7 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Total: 7 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Resources: Dec 3 09:09:07 np0005543225 puppet-user[65354]: Skipped: 13 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Changed: 5 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Out of sync: 5 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Total: 20 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Time: Dec 3 09:09:07 np0005543225 puppet-user[65354]: File: 0.01 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Transaction evaluation: 0.03 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Catalog application: 0.03 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Config retrieval: 0.16 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Last run: 1764752947 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Total: 0.03 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Version: Dec 3 09:09:07 np0005543225 puppet-user[65354]: Config: 1764752946 Dec 3 09:09:07 np0005543225 puppet-user[65354]: Puppet: 7.10.0 Dec 3 09:09:07 np0005543225 puppet-user[65379]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:07 np0005543225 puppet-user[65379]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:07 np0005543225 puppet-user[65379]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:07 np0005543225 puppet-user[65379]: (file & line not available) Dec 3 09:09:07 np0005543225 podman[65773]: 2025-12-03 09:09:07.205538374 +0000 UTC m=+0.106481446 container cleanup 0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, com.redhat.component=openstack-keystone-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, config_id=tripleo_puppet_step1, tcib_managed=true, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, build-date=2025-11-18T23:45:30Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, container_name=container-puppet-keystone, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 keystone, name=rhosp17/openstack-keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, io.openshift.expose-services=, architecture=x86_64, url=https://www.redhat.com, batch=17.1_20251118.1) Dec 3 09:09:07 np0005543225 systemd[1]: libpod-conmon-0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b.scope: Deactivated successfully. Dec 3 09:09:07 np0005543225 systemd[1]: var-lib-containers-storage-overlay-0f02f80c6d22cdc5384a31dcd3095b13abffa0b36bcf2863f3ecfb6f560a4c8d-merged.mount: Deactivated successfully. Dec 3 09:09:07 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-0213bc0b6a06f3bc37af1f7750bdc3e640f30da2db42e0ae47c1c1ee85986c0b-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:07 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-keystone --conmon-pidfile /run/container-puppet-keystone.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config --env NAME=keystone --env STEP_CONFIG=include ::tripleo::packages#012['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::keystone#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-keystone --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-keystone.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Dec 3 09:09:07 np0005543225 puppet-user[65379]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:07 np0005543225 puppet-user[65379]: (file & line not available) Dec 3 09:09:07 np0005543225 puppet-user[65379]: Warning: Unknown variable: 'dhcp_agents_per_net'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/neutron.pp, line: 154, column: 37) Dec 3 09:09:07 np0005543225 puppet-user[65347]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:07 np0005543225 puppet-user[65347]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:07 np0005543225 puppet-user[65347]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:07 np0005543225 puppet-user[65347]: (file & line not available) Dec 3 09:09:07 np0005543225 systemd[1]: libpod-cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f.scope: Deactivated successfully. Dec 3 09:09:07 np0005543225 systemd[1]: libpod-cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f.scope: Consumed 2.268s CPU time. Dec 3 09:09:07 np0005543225 podman[65231]: 2025-12-03 09:09:07.511708997 +0000 UTC m=+2.741109248 container died cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, build-date=2025-11-18T22:49:46Z, name=rhosp17/openstack-qdrouterd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, io.buildah.version=1.41.4, container_name=container-puppet-metrics_qdr, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, tcib_managed=true, com.redhat.component=openstack-qdrouterd-container, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_puppet_step1, architecture=x86_64) Dec 3 09:09:07 np0005543225 puppet-user[65347]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:07 np0005543225 puppet-user[65347]: (file & line not available) Dec 3 09:09:07 np0005543225 systemd[1]: tmp-crun.MJLOGy.mount: Deactivated successfully. Dec 3 09:09:07 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:07 np0005543225 podman[65969]: 2025-12-03 09:09:07.617264758 +0000 UTC m=+0.095410462 container cleanup cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-qdrouterd, batch=17.1_20251118.1, vcs-type=git, build-date=2025-11-18T22:49:46Z, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, vendor=Red Hat, Inc., managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, container_name=container-puppet-metrics_qdr, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.openshift.expose-services=, release=1761123044) Dec 3 09:09:07 np0005543225 systemd[1]: libpod-conmon-cb4be84de1ec276b6cdb1cfb4dcbd43ec0244a430c42d722177a21a296ceff4f.scope: Deactivated successfully. Dec 3 09:09:07 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-metrics_qdr --conmon-pidfile /run/container-puppet-metrics_qdr.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=metrics_qdr --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::qdr#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-metrics_qdr --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-metrics_qdr.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:07 np0005543225 puppet-user[65200]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/manila/manifests/share.pp, line: 50, column: 18) Dec 3 09:09:07 np0005543225 podman[65994]: 2025-12-03 09:09:07.714192521 +0000 UTC m=+0.096804600 container create e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, url=https://www.redhat.com, tcib_managed=true, name=rhosp17/openstack-nova-api, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, maintainer=OpenStack TripleO Team, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:34:57Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, distribution-scope=public, vcs-type=git, release=1761123044, container_name=container-puppet-nova_metadata) Dec 3 09:09:07 np0005543225 puppet-user[65200]: Warning: Unknown variable: 'manila_generic_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 292, column: 48) Dec 3 09:09:07 np0005543225 puppet-user[65200]: Warning: Unknown variable: 'manila_netapp_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 294, column: 39) Dec 3 09:09:07 np0005543225 puppet-user[65200]: Warning: Unknown variable: 'manila_vmax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 295, column: 39) Dec 3 09:09:07 np0005543225 puppet-user[65200]: Warning: Unknown variable: 'manila_powermax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 296, column: 39) Dec 3 09:09:07 np0005543225 puppet-user[65200]: Warning: Unknown variable: 'manila_isilon_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 297, column: 39) Dec 3 09:09:07 np0005543225 puppet-user[65200]: Warning: Unknown variable: 'manila_unity_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 298, column: 39) Dec 3 09:09:07 np0005543225 puppet-user[65200]: Warning: Unknown variable: 'manila_vnx_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 299, column: 39) Dec 3 09:09:07 np0005543225 puppet-user[65200]: Warning: Unknown variable: 'manila_flashblade_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 300, column: 39) Dec 3 09:09:07 np0005543225 systemd[1]: Started libpod-conmon-e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8.scope. Dec 3 09:09:07 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:07 np0005543225 podman[65994]: 2025-12-03 09:09:07.664703787 +0000 UTC m=+0.047315896 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 09:09:07 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/30d62ba9dab8ba6b202aab198fad49c4455f5a260b67e97db57939f6bd15a288/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:07 np0005543225 podman[65994]: 2025-12-03 09:09:07.780435787 +0000 UTC m=+0.163047866 container init e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, vendor=Red Hat, Inc., vcs-type=git, summary=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, container_name=container-puppet-nova_metadata, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, distribution-scope=public, io.buildah.version=1.41.4, build-date=2025-11-19T00:34:57Z, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.component=openstack-nova-api-container, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, release=1761123044, description=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-nova-api) Dec 3 09:09:07 np0005543225 podman[65994]: 2025-12-03 09:09:07.793123084 +0000 UTC m=+0.175735173 container start e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, batch=17.1_20251118.1, build-date=2025-11-19T00:34:57Z, description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, version=17.1.12, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, name=rhosp17/openstack-nova-api, release=1761123044, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, container_name=container-puppet-nova_metadata, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Dec 3 09:09:07 np0005543225 podman[65994]: 2025-12-03 09:09:07.793420722 +0000 UTC m=+0.176032801 container attach e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, description=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, tcib_managed=true, name=rhosp17/openstack-nova-api, managed_by=tripleo_ansible, io.openshift.expose-services=, build-date=2025-11-19T00:34:57Z, distribution-scope=public, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, config_id=tripleo_puppet_step1, com.redhat.component=openstack-nova-api-container, io.buildah.version=1.41.4, container_name=container-puppet-nova_metadata, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.12, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:07 np0005543225 puppet-user[65347]: Could not connect to the CIB: Transport endpoint is not connected Dec 3 09:09:07 np0005543225 puppet-user[65347]: Init failed, could not perform requested operations Dec 3 09:09:07 np0005543225 puppet-user[65347]: -:1: parser error : Document is empty Dec 3 09:09:07 np0005543225 puppet-user[65347]: Dec 3 09:09:07 np0005543225 puppet-user[65347]: ^ Dec 3 09:09:08 np0005543225 puppet-user[65200]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Dec 3 09:09:08 np0005543225 podman[66085]: 2025-12-03 09:09:08.090669769 +0000 UTC m=+0.048172019 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Dec 3 09:09:08 np0005543225 podman[66085]: 2025-12-03 09:09:08.125400161 +0000 UTC m=+0.082902391 container create 8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, name=rhosp17/openstack-cron, architecture=x86_64, build-date=2025-11-18T22:49:32Z, com.redhat.component=openstack-cron-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, io.buildah.version=1.41.4, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, container_name=container-puppet-crond, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 cron, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, release=1761123044, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:09:08 np0005543225 puppet-user[65200]: Warning: Scope(Apache::Vhost[manila_wsgi]): Dec 3 09:09:08 np0005543225 puppet-user[65200]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:08 np0005543225 puppet-user[65200]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:08 np0005543225 puppet-user[65200]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:08 np0005543225 puppet-user[65200]: file names. Dec 3 09:09:08 np0005543225 puppet-user[65200]: Dec 3 09:09:08 np0005543225 puppet-user[65200]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:08 np0005543225 puppet-user[65200]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:08 np0005543225 puppet-user[65200]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:08 np0005543225 systemd[1]: Started libpod-conmon-8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475.scope. Dec 3 09:09:08 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:08 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a3b36ab08695fadb3653b15f50530524140dcf16a7f3987b7655e790d6509bd5/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:08 np0005543225 podman[66085]: 2025-12-03 09:09:08.186125732 +0000 UTC m=+0.143627972 container init 8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, vendor=Red Hat, Inc., io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, release=1761123044, config_id=tripleo_puppet_step1, distribution-scope=public, name=rhosp17/openstack-cron, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:32Z, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-crond, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 cron, version=17.1.12, architecture=x86_64, io.buildah.version=1.41.4, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-cron-container) Dec 3 09:09:08 np0005543225 podman[66085]: 2025-12-03 09:09:08.195560643 +0000 UTC m=+0.153062883 container start 8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, batch=17.1_20251118.1, url=https://www.redhat.com, tcib_managed=true, vcs-type=git, maintainer=OpenStack TripleO Team, version=17.1.12, name=rhosp17/openstack-cron, container_name=container-puppet-crond, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, com.redhat.component=openstack-cron-container, io.buildah.version=1.41.4, release=1761123044, summary=Red Hat OpenStack Platform 17.1 cron, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 cron, build-date=2025-11-18T22:49:32Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 cron) Dec 3 09:09:08 np0005543225 podman[66085]: 2025-12-03 09:09:08.196332653 +0000 UTC m=+0.153834903 container attach 8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:32Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, version=17.1.12, url=https://www.redhat.com, com.redhat.component=openstack-cron-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, name=rhosp17/openstack-cron, container_name=container-puppet-crond, release=1761123044, summary=Red Hat OpenStack Platform 17.1 cron, io.openshift.expose-services=, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, managed_by=tripleo_ansible, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:09:08 np0005543225 systemd[1]: var-lib-containers-storage-overlay-729c90e352bbd7f87a283a7c09b6b5141389b5e27d09ac65bf0ae9bd48088e3e-merged.mount: Deactivated successfully. Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.75 seconds Dec 3 09:09:08 np0005543225 ovs-vsctl[66125]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:09:08 np0005543225 puppet-user[65656]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:08 np0005543225 puppet-user[65656]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:08 np0005543225 puppet-user[65656]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:08 np0005543225 puppet-user[65656]: (file & line not available) Dec 3 09:09:08 np0005543225 puppet-user[65347]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65656]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:08 np0005543225 puppet-user[65656]: (file & line not available) Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/api_paste_config]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/storage_availability_zone]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/rootwrap_config]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/state_path]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/host]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_listen]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/enabled_share_protocols]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/default_share_type]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_workers]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/auth_strategy]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Cron::Db_purge/Cron[manila-manage db purge]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65379]: Warning: Scope(Apache::Vhost[neutron-api-proxy]): Dec 3 09:09:08 np0005543225 puppet-user[65379]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:08 np0005543225 puppet-user[65379]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:08 np0005543225 puppet-user[65379]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:08 np0005543225 puppet-user[65379]: file names. Dec 3 09:09:08 np0005543225 puppet-user[65379]: Dec 3 09:09:08 np0005543225 puppet-user[65379]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:08 np0005543225 puppet-user[65379]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:08 np0005543225 puppet-user[65379]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:08 np0005543225 puppet-user[65347]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.47 seconds Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_url]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_type]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/region_name]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/username]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/user_domain_name]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/password]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_name]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_domain_name]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_api_class]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_url]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_type]/ensure: created Dec 3 09:09:08 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/region_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.82 seconds Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/username]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/user_domain_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/password]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65656]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Dec 3 09:09:09 np0005543225 puppet-user[65656]: in a future release. Use nova::cinder::os_region_name instead Dec 3 09:09:09 np0005543225 puppet-user[65656]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Dec 3 09:09:09 np0005543225 puppet-user[65656]: in a future release. Use nova::cinder::catalog_info instead Dec 3 09:09:09 np0005543225 puppet-user[65656]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Dec 3 09:09:09 np0005543225 puppet-user[65656]: removed in a future realse. Use nova::db::database_connection instead Dec 3 09:09:09 np0005543225 puppet-user[65656]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Dec 3 09:09:09 np0005543225 puppet-user[65656]: removed in a future realse. Use nova::db::api_database_connection instead Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_domain_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv4_enabled]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv6_enabled]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Backends/Manila_config[DEFAULT/enabled_share_backends]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/connection]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65656]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Dec 3 09:09:09 np0005543225 puppet-user[65347]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}ef3f593b0b46db53f6b97e2ab3b05a160a2ea23f0d31cb8f10d27a5cbd8f94c0' Dec 3 09:09:09 np0005543225 puppet-user[65347]: Notice: /Stage[main]/Mysql::Server::Config/File[mysql-config-file]/content: content changed '{sha256}df7b18b99470a82afb1aebff284d910b04ceb628c9ac89d8e2fe9fb4682d5fc9' to '{sha256}6e3e8f117c57a2a2c1c192a075f027c98c92915afa958b116631e0e3996f4b44' Dec 3 09:09:09 np0005543225 puppet-user[65347]: Notice: /Stage[main]/Mysql::Server::Installdb/File[/var/log/mariadb/mariadb.log]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/max_retries]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65347]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/root/.my.cnf]/ensure: defined content as '{sha256}98314b5eae4d44311bb4ba3cfaf593836a30c5495707471136aeccfb1e56efe1' Dec 3 09:09:09 np0005543225 puppet-user[65347]: Notice: Applied catalog in 0.22 seconds Dec 3 09:09:09 np0005543225 puppet-user[65347]: Application: Dec 3 09:09:09 np0005543225 puppet-user[65347]: Initial environment: production Dec 3 09:09:09 np0005543225 puppet-user[65347]: Converged environment: production Dec 3 09:09:09 np0005543225 puppet-user[65347]: Run mode: user Dec 3 09:09:09 np0005543225 puppet-user[65347]: Changes: Dec 3 09:09:09 np0005543225 puppet-user[65347]: Total: 4 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Events: Dec 3 09:09:09 np0005543225 puppet-user[65347]: Success: 4 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Total: 4 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Resources: Dec 3 09:09:09 np0005543225 puppet-user[65347]: Skipped: 151 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Changed: 4 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Out of sync: 4 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Total: 156 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Time: Dec 3 09:09:09 np0005543225 puppet-user[65347]: File: 0.02 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Transaction evaluation: 0.21 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Catalog application: 0.22 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Config retrieval: 1.58 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Last run: 1764752949 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Total: 0.22 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Version: Dec 3 09:09:09 np0005543225 puppet-user[65347]: Config: 1764752947 Dec 3 09:09:09 np0005543225 puppet-user[65347]: Puppet: 7.10.0 Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/db_max_retries]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Rabbit[manila_config]/Manila_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/bind_host]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/auth_strategy]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/core_plugin]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/host]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dns_domain]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dhcp_agent_notification]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/allow_overlapping_ips]/ensure: created Dec 3 09:09:09 np0005543225 sshd[66203]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/global_physnet_mtu]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/vlan_transparent]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[agent/root_helper]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[agent/report_interval]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/service_plugins]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_url]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/username]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/server_request_prefix]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/broadcast_prefix]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/password]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/group_request_prefix]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_domain_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/user_domain_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/region_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/endpoint_type]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_type]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/container_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_url]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/username]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/idle_timeout]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/password]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/trace]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_domain_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/user_domain_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/region_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_type]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/l3_ha]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/max_l3_agents_per_router]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:09 np0005543225 ovs-vsctl[66238]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/control_exchange]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:09 np0005543225 systemd[1]: libpod-ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428.scope: Deactivated successfully. Dec 3 09:09:09 np0005543225 systemd[1]: libpod-ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428.scope: Consumed 4.506s CPU time. Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila/Oslo::Concurrency[manila_config]/Manila_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/debug]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/api_workers]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/rpc_workers]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/agent_down_time]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/router_scheduler_driver]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/allow_automatic_l3agent_failover]/ensure: created Dec 3 09:09:09 np0005543225 podman[66247]: 2025-12-03 09:09:09.701066697 +0000 UTC m=+0.055669108 container died ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, config_id=tripleo_puppet_step1, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-mariadb-container, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, io.buildah.version=1.41.4, release=1761123044, build-date=2025-11-18T22:51:13Z, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, container_name=container-puppet-mysql, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, name=rhosp17/openstack-mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Dec 3 09:09:09 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server/Neutron_config[ovs/igmp_snooping_enable]/ensure: created Dec 3 09:09:09 np0005543225 systemd[1]: var-lib-containers-storage-overlay-69545e9775297658af302aa9ed4a45c6d72379aafad676a33f5955f585b7b3fc-merged.mount: Deactivated successfully. Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_port]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_security_group]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_network_gateway]/ensure: created Dec 3 09:09:09 np0005543225 podman[66247]: 2025-12-03 09:09:09.754423963 +0000 UTC m=+0.109026344 container cleanup ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:51:13Z, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-mysql, url=https://www.redhat.com, batch=17.1_20251118.1, release=1761123044, io.buildah.version=1.41.4, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, io.openshift.expose-services=, architecture=x86_64, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc.) Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_packet_filter]/ensure: created Dec 3 09:09:09 np0005543225 systemd[1]: libpod-conmon-ddab764839243f32e8790739a72be5988f6fb596402bda947415d1aa33ed4428.scope: Deactivated successfully. Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:09 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-mysql --conmon-pidfile /run/container-puppet-mysql.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=mysql --env STEP_CONFIG=include ::tripleo::packages#012['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }#012exec {'wait-for-settle': command => '/bin/true' }#012include tripleo::profile::pacemaker::database::mysql_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-mysql --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-mysql.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/neutron/plugin.ini]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/default/neutron-server]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/type_drivers]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/tenant_network_types]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/mechanism_drivers]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65656]: Warning: Unknown variable: '::nova::scheduler::filter::scheduler_max_attempts'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 122, column: 29) Dec 3 09:09:09 np0005543225 puppet-user[65656]: Warning: Unknown variable: '::nova::scheduler::filter::periodic_task_interval'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 123, column: 39) Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/path_mtu]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/extension_drivers]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/overlay_ip_version]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65656]: Warning: Scope(Class[Nova::Scheduler::Filter]): The nova::scheduler::filter::scheduler_max_attempts parameter has been deprecated and \ Dec 3 09:09:09 np0005543225 puppet-user[65656]: will be removed in a future release. Use the nova::scheduler::max_attempts parameter instead. Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/control_exchange]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Oslo::Concurrency[neutron_config]/Neutron_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[66053]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:09 np0005543225 puppet-user[66053]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:09 np0005543225 puppet-user[66053]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:09 np0005543225 puppet-user[66053]: (file & line not available) Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[66053]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:09 np0005543225 puppet-user[66053]: (file & line not available) Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}cf3017b8476bb034424a82e9ef613fcded0d0cbd03721bfc05b105e5fbb561e9' Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:09 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/debug]/ensure: created Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:09 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:10 np0005543225 puppet-user[66053]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Dec 3 09:09:10 np0005543225 puppet-user[66053]: in a future release. Use nova::cinder::os_region_name instead Dec 3 09:09:10 np0005543225 puppet-user[66053]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Dec 3 09:09:10 np0005543225 puppet-user[66053]: in a future release. Use nova::cinder::catalog_info instead Dec 3 09:09:10 np0005543225 puppet-user[66053]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Dec 3 09:09:10 np0005543225 puppet-user[66053]: removed in a future realse. Use nova::db::database_connection instead Dec 3 09:09:10 np0005543225 puppet-user[66053]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Dec 3 09:09:10 np0005543225 puppet-user[66053]: removed in a future realse. Use nova::db::api_database_connection instead Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Policy/Oslo::Policy[manila_config]/Manila_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Api/Oslo::Middleware[manila_config]/Manila_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[66115]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:10 np0005543225 puppet-user[66115]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:10 np0005543225 puppet-user[66115]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:10 np0005543225 puppet-user[66115]: (file & line not available) Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[/var/www/cgi-bin/manila]/group: group changed 'root' to 'manila' Dec 3 09:09:10 np0005543225 puppet-user[66115]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:10 np0005543225 puppet-user[66115]: (file & line not available) Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[manila_wsgi]/ensure: defined content as '{sha256}ca07199ace8325d094e754ccdfefb2b5a78a13cd657d68221b3a68b53b0dd893' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/driver_handles_share_servers]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_backend_name]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[66115]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.08 seconds Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_driver]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[66053]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_conf_path]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_auth_id]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_cluster_name]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_ip]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[66115]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/File[/etc/logrotate-crond.conf]/ensure: defined content as '{sha256}1c3202f58bd2ae16cb31badcbb7f0d4e6697157b987d1887736ad96bb73d70b0' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[66115]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/Cron[logrotate-crond]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_is_remote]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}62d580b7adecb2bd04af6ef451f8bb27291f7dfa5a3d582660b774da9aff158e' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:10 np0005543225 puppet-user[66115]: Notice: Applied catalog in 0.03 seconds Dec 3 09:09:10 np0005543225 puppet-user[66115]: Application: Dec 3 09:09:10 np0005543225 puppet-user[66115]: Initial environment: production Dec 3 09:09:10 np0005543225 puppet-user[66115]: Converged environment: production Dec 3 09:09:10 np0005543225 puppet-user[66115]: Run mode: user Dec 3 09:09:10 np0005543225 puppet-user[66115]: Changes: Dec 3 09:09:10 np0005543225 puppet-user[66115]: Total: 2 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Events: Dec 3 09:09:10 np0005543225 puppet-user[66115]: Success: 2 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Total: 2 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Resources: Dec 3 09:09:10 np0005543225 puppet-user[66115]: Changed: 2 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Out of sync: 2 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Skipped: 7 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Total: 9 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Time: Dec 3 09:09:10 np0005543225 puppet-user[66115]: File: 0.01 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Cron: 0.01 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Transaction evaluation: 0.03 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Catalog application: 0.03 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Config retrieval: 0.11 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Last run: 1764752950 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Total: 0.03 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Version: Dec 3 09:09:10 np0005543225 puppet-user[66115]: Config: 1764752950 Dec 3 09:09:10 np0005543225 puppet-user[66115]: Puppet: 7.10.0 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_volume_mode]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_protocol_helper_type]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:10 np0005543225 podman[66420]: 2025-12-03 09:09:10.244621429 +0000 UTC m=+0.112206958 container create 8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-ovn-controller, architecture=x86_64, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, com.redhat.component=openstack-ovn-controller-container, io.buildah.version=1.41.4, version=17.1.12, build-date=2025-11-18T23:34:05Z, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, summary=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, config_id=tripleo_puppet_step1, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-ovn_controller, url=https://www.redhat.com, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git) Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/Apache::Vhost[manila_wsgi]/Concat[10-manila_wsgi.conf]/File[/etc/httpd/conf.d/10-manila_wsgi.conf]/ensure: defined content as '{sha256}b1b65150549b5edfc80d7dd87e4dac93e54eb10eb8472594fb27b15556b3ae3f' Dec 3 09:09:10 np0005543225 systemd[1]: Started libpod-conmon-8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99.scope. Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:10 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:10 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/39d0618885746765fa8701f291b53c50a4caa34e167c1ba8a10ca8e8e396fa7c/merged/etc/sysconfig/modules supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:10 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/39d0618885746765fa8701f291b53c50a4caa34e167c1ba8a10ca8e8e396fa7c/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:10 np0005543225 podman[66420]: 2025-12-03 09:09:10.202732137 +0000 UTC m=+0.070317696 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Notice: Applied catalog in 1.75 seconds Dec 3 09:09:10 np0005543225 podman[66420]: 2025-12-03 09:09:10.306231713 +0000 UTC m=+0.173817222 container init 8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, managed_by=tripleo_ansible, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, build-date=2025-11-18T23:34:05Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 ovn-controller, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, batch=17.1_20251118.1, distribution-scope=public, url=https://www.redhat.com, tcib_managed=true, container_name=container-puppet-ovn_controller, name=rhosp17/openstack-ovn-controller, architecture=x86_64, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, config_id=tripleo_puppet_step1, com.redhat.component=openstack-ovn-controller-container, release=1761123044) Dec 3 09:09:10 np0005543225 puppet-user[65200]: Application: Dec 3 09:09:10 np0005543225 puppet-user[65200]: Initial environment: production Dec 3 09:09:10 np0005543225 puppet-user[65200]: Converged environment: production Dec 3 09:09:10 np0005543225 puppet-user[65200]: Run mode: user Dec 3 09:09:10 np0005543225 puppet-user[65200]: Changes: Dec 3 09:09:10 np0005543225 puppet-user[65200]: Total: 115 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Events: Dec 3 09:09:10 np0005543225 puppet-user[65200]: Success: 115 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Total: 115 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Resources: Dec 3 09:09:10 np0005543225 puppet-user[65200]: Changed: 115 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Out of sync: 115 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Skipped: 51 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Total: 334 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Time: Dec 3 09:09:10 np0005543225 puppet-user[65200]: Resources: 0.00 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Concat file: 0.00 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Concat fragment: 0.00 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Cron: 0.01 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Augeas: 0.02 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Package: 0.03 Dec 3 09:09:10 np0005543225 puppet-user[65200]: File: 0.13 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Manila config: 1.26 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Transaction evaluation: 1.73 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Catalog application: 1.75 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Config retrieval: 1.93 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Last run: 1764752950 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Total: 1.75 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Version: Dec 3 09:09:10 np0005543225 puppet-user[65200]: Config: 1764752946 Dec 3 09:09:10 np0005543225 puppet-user[65200]: Puppet: 7.10.0 Dec 3 09:09:10 np0005543225 podman[66420]: 2025-12-03 09:09:10.312830658 +0000 UTC m=+0.180416167 container start 8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, vendor=Red Hat, Inc., vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T23:34:05Z, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, com.redhat.component=openstack-ovn-controller-container, batch=17.1_20251118.1, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-ovn-controller, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-ovn_controller, distribution-scope=public, version=17.1.12, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, io.buildah.version=1.41.4) Dec 3 09:09:10 np0005543225 podman[66420]: 2025-12-03 09:09:10.312945481 +0000 UTC m=+0.180530990 container attach 8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, name=rhosp17/openstack-ovn-controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ovn-controller, batch=17.1_20251118.1, version=17.1.12, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, architecture=x86_64, com.redhat.component=openstack-ovn-controller-container, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, build-date=2025-11-18T23:34:05Z, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-ovn_controller, vcs-type=git, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, summary=Red Hat OpenStack Platform 17.1 ovn-controller, url=https://www.redhat.com, managed_by=tripleo_ansible) Dec 3 09:09:10 np0005543225 puppet-user[65656]: Warning: Scope(Apache::Vhost[nova_api_wsgi]): Dec 3 09:09:10 np0005543225 puppet-user[65656]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:10 np0005543225 puppet-user[65656]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:10 np0005543225 puppet-user[65656]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:10 np0005543225 puppet-user[65656]: file names. Dec 3 09:09:10 np0005543225 puppet-user[65656]: Dec 3 09:09:10 np0005543225 puppet-user[65656]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:10 np0005543225 puppet-user[65656]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:10 np0005543225 puppet-user[65656]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/connection]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/max_retries]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/db_max_retries]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Policy/Oslo::Policy[neutron_config]/Neutron_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Server/Oslo::Middleware[neutron_config]/Neutron_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/max_header_size]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/vni_ranges]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vxlan_group]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vni_ranges]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vlan]/Neutron_plugin_ml2[ml2_type_vlan/network_vlan_ranges]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[flat]/Neutron_plugin_ml2[ml2_type_flat/flat_networks]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_connection]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_connection]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_private_key]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_certificate]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_ca_cert]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_private_key]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_certificate]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_ca_cert]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_connection_timeout]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_probe_interval]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/neutron_sync_mode]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_metadata_enabled]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/enable_distributed_floating_ip]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/dns_servers]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_emit_need_to_frag]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/rate_limit]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/burst_limit]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.79 seconds Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: /Stage[main]/Tripleo::Profile::Base::Neutron::Server/Tripleo::Tls_proxy[neutron-api]/Apache::Vhost[neutron-api-proxy]/Concat[25-neutron-api-proxy.conf]/File[/etc/httpd/conf.d/25-neutron-api-proxy.conf]/ensure: defined content as '{sha256}fd4f0e4b9cbf23a77b7ac7a1379d9bff016ac0756a42c4ba89b8ebfe1a2fb0ef' Dec 3 09:09:10 np0005543225 systemd[1]: libpod-8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475.scope: Deactivated successfully. Dec 3 09:09:10 np0005543225 systemd[1]: libpod-8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475.scope: Consumed 2.205s CPU time. Dec 3 09:09:10 np0005543225 podman[66085]: 2025-12-03 09:09:10.555155708 +0000 UTC m=+2.512657968 container died 8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 cron, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, name=rhosp17/openstack-cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T22:49:32Z, io.buildah.version=1.41.4, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, url=https://www.redhat.com, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, maintainer=OpenStack TripleO Team, container_name=container-puppet-crond, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, com.redhat.component=openstack-cron-container, batch=17.1_20251118.1, release=1761123044, description=Red Hat OpenStack Platform 17.1 cron) Dec 3 09:09:10 np0005543225 puppet-user[65379]: Notice: Applied catalog in 1.41 seconds Dec 3 09:09:10 np0005543225 puppet-user[65379]: Application: Dec 3 09:09:10 np0005543225 puppet-user[65379]: Initial environment: production Dec 3 09:09:10 np0005543225 puppet-user[65379]: Converged environment: production Dec 3 09:09:10 np0005543225 puppet-user[65379]: Run mode: user Dec 3 09:09:10 np0005543225 puppet-user[65379]: Changes: Dec 3 09:09:10 np0005543225 puppet-user[65379]: Total: 137 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Events: Dec 3 09:09:10 np0005543225 puppet-user[65379]: Success: 137 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Total: 137 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Resources: Dec 3 09:09:10 np0005543225 puppet-user[65379]: Changed: 137 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Out of sync: 137 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Skipped: 42 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Total: 385 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Time: Dec 3 09:09:10 np0005543225 puppet-user[65379]: Resources: 0.00 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Concat file: 0.00 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Concat fragment: 0.00 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Augeas: 0.02 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Package: 0.03 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Neutron plugin ml2: 0.05 Dec 3 09:09:10 np0005543225 puppet-user[65379]: File: 0.12 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Neutron config: 0.91 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Transaction evaluation: 1.40 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Catalog application: 1.41 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Config retrieval: 1.98 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Last run: 1764752950 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Total: 1.41 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Version: Dec 3 09:09:10 np0005543225 puppet-user[65379]: Config: 1764752947 Dec 3 09:09:10 np0005543225 puppet-user[65379]: Puppet: 7.10.0 Dec 3 09:09:10 np0005543225 podman[66489]: 2025-12-03 09:09:10.668332901 +0000 UTC m=+0.099436909 container cleanup 8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475 (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, url=https://www.redhat.com, build-date=2025-11-18T22:49:32Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-crond, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, release=1761123044, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 cron, tcib_managed=true, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 cron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, com.redhat.component=openstack-cron-container, vendor=Red Hat, Inc., io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-cron, batch=17.1_20251118.1, vcs-type=git) Dec 3 09:09:10 np0005543225 systemd[1]: libpod-conmon-8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475.scope: Deactivated successfully. Dec 3 09:09:10 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-crond --conmon-pidfile /run/container-puppet-crond.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=crond --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::logrotate --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-crond --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-crond.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Dec 3 09:09:10 np0005543225 systemd[1]: var-lib-containers-storage-overlay-a3b36ab08695fadb3653b15f50530524140dcf16a7f3987b7655e790d6509bd5-merged.mount: Deactivated successfully. Dec 3 09:09:10 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-8735ad972cd6a59870fe8461b7e2ce43ae67408bde112513e77eec789796b475-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}300c72dc6d6531adc82e8176277b4b32c96c80f2a0f9aaa823ba8c6386bef2e8' Dec 3 09:09:10 np0005543225 systemd[1]: libpod-4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51.scope: Deactivated successfully. Dec 3 09:09:10 np0005543225 systemd[1]: libpod-4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51.scope: Consumed 5.967s CPU time. Dec 3 09:09:10 np0005543225 podman[65087]: 2025-12-03 09:09:10.95662076 +0000 UTC m=+6.472901183 container died 4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, vcs-type=git, io.buildah.version=1.41.4, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_puppet_step1, name=rhosp17/openstack-manila-api, com.redhat.component=openstack-manila-api-container, io.openshift.expose-services=, url=https://www.redhat.com, batch=17.1_20251118.1, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 manila-api, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-19T00:21:10Z, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, description=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, release=1761123044, tcib_managed=true, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-manila) Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:10 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:11 np0005543225 systemd[1]: tmp-crun.Qw1AHJ.mount: Deactivated successfully. Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:11 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Dec 3 09:09:11 np0005543225 podman[66578]: 2025-12-03 09:09:11.107719479 +0000 UTC m=+0.137872219 container cleanup 4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-manila, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, release=1761123044, io.openshift.expose-services=, url=https://www.redhat.com, name=rhosp17/openstack-manila-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, build-date=2025-11-19T00:21:10Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, com.redhat.component=openstack-manila-api-container, description=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, io.buildah.version=1.41.4, vendor=Red Hat, Inc., tcib_managed=true) Dec 3 09:09:11 np0005543225 systemd[1]: libpod-conmon-4d91deefa8c01eccff1ed9b90f9e46ed13c748d6e7400ed00af3fe6163e32b51.scope: Deactivated successfully. Dec 3 09:09:11 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-manila --conmon-pidfile /run/container-puppet-manila.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line --env NAME=manila --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::manila::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::manila::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::manila::share_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-manila --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-manila.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[nova_api_wsgi]/ensure: defined content as '{sha256}901cc9636a87a089b1b6620430d7a36909add0ca7dc2216b74d7bb9dc627d776' Dec 3 09:09:11 np0005543225 puppet-user[66053]: Warning: Scope(Apache::Vhost[nova_metadata_wsgi]): Dec 3 09:09:11 np0005543225 puppet-user[66053]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:11 np0005543225 puppet-user[66053]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:11 np0005543225 puppet-user[66053]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:11 np0005543225 puppet-user[66053]: file names. Dec 3 09:09:11 np0005543225 puppet-user[66053]: Dec 3 09:09:11 np0005543225 puppet-user[66053]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:11 np0005543225 puppet-user[66053]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:11 np0005543225 puppet-user[66053]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Dec 3 09:09:11 np0005543225 podman[66612]: 2025-12-03 09:09:11.191145962 +0000 UTC m=+0.092267689 container create d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, summary=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, name=rhosp17/openstack-placement-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, distribution-scope=public, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, tcib_managed=true, com.redhat.component=openstack-placement-api-container, release=1761123044, version=17.1.12, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-placement, build-date=2025-11-18T23:41:26Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, description=Red Hat OpenStack Platform 17.1 placement-api) Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Dec 3 09:09:11 np0005543225 systemd[1]: Started libpod-conmon-d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca.scope. Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Dec 3 09:09:11 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:11 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b229295d0df5440a40679e8a95e77b5c1dc97a8bc2cd058149233a0853850499/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Dec 3 09:09:11 np0005543225 podman[66612]: 2025-12-03 09:09:11.147477733 +0000 UTC m=+0.048599470 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.49 seconds Dec 3 09:09:11 np0005543225 podman[66612]: 2025-12-03 09:09:11.307355235 +0000 UTC m=+0.208476952 container init d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, container_name=container-puppet-placement, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, managed_by=tripleo_ansible, com.redhat.component=openstack-placement-api-container, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, io.openshift.expose-services=, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vendor=Red Hat, Inc., version=17.1.12, url=https://www.redhat.com, build-date=2025-11-18T23:41:26Z, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:11 np0005543225 podman[66612]: 2025-12-03 09:09:11.320559066 +0000 UTC m=+0.221680783 container start d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.component=openstack-placement-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.buildah.version=1.41.4, name=rhosp17/openstack-placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.12, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, url=https://www.redhat.com, container_name=container-puppet-placement, distribution-scope=public, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, io.openshift.expose-services=, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T23:41:26Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64) Dec 3 09:09:11 np0005543225 podman[66612]: 2025-12-03 09:09:11.321409978 +0000 UTC m=+0.222531725 container attach d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, name=rhosp17/openstack-placement-api, description=Red Hat OpenStack Platform 17.1 placement-api, config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, com.redhat.component=openstack-placement-api-container, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T23:41:26Z, architecture=x86_64, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, summary=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, vcs-type=git, container_name=container-puppet-placement, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.expose-services=) Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Dec 3 09:09:11 np0005543225 systemd[1]: libpod-32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e.scope: Deactivated successfully. Dec 3 09:09:11 np0005543225 systemd[1]: libpod-32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e.scope: Consumed 5.731s CPU time. Dec 3 09:09:11 np0005543225 podman[65342]: 2025-12-03 09:09:11.389161667 +0000 UTC m=+6.341258081 container died 32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, com.redhat.component=openstack-neutron-server-container, description=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, release=1761123044, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.12, tcib_managed=true, distribution-scope=public, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-neutron-server, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, io.buildah.version=1.41.4, container_name=container-puppet-neutron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:23:27Z, io.openshift.expose-services=, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, vcs-type=git) Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Dec 3 09:09:11 np0005543225 podman[66713]: 2025-12-03 09:09:11.472005334 +0000 UTC m=+0.075992277 container cleanup 32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, batch=17.1_20251118.1, release=1761123044, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, architecture=x86_64, url=https://www.redhat.com, tcib_managed=true, build-date=2025-11-19T00:23:27Z, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-neutron-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 neutron-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-neutron, vcs-type=git, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, managed_by=tripleo_ansible, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 neutron-server, config_id=tripleo_puppet_step1) Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Dec 3 09:09:11 np0005543225 systemd[1]: libpod-conmon-32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e.scope: Deactivated successfully. Dec 3 09:09:11 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-neutron --conmon-pidfile /run/container-puppet-neutron.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2 --env NAME=neutron --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::server#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::neutron::plugins::ml2#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-neutron --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-neutron.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Dec 3 09:09:11 np0005543225 podman[66736]: 2025-12-03 09:09:11.494800369 +0000 UTC m=+0.035837821 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 09:09:11 np0005543225 systemd[1]: var-lib-containers-storage-overlay-9ea2cb49f97c616684616b03a2809444c83e8486e244e56abce19c2e597d1a29-merged.mount: Deactivated successfully. Dec 3 09:09:11 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-32466778bf964cb3f86c9c4e655666ddd07ddfd21eda581105b71017a645646e-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:11 np0005543225 systemd[1]: var-lib-containers-storage-overlay-e72a275e3fcddea4d40647780df82467222633a2e4fcad326832238e4d5fc947-merged.mount: Deactivated successfully. Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Dec 3 09:09:11 np0005543225 podman[66736]: 2025-12-03 09:09:11.825593425 +0000 UTC m=+0.366630917 container create 7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, container_name=container-puppet-rabbitmq, io.buildah.version=1.41.4, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, tcib_managed=true, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, build-date=2025-11-18T22:49:50Z, release=1761123044, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 rabbitmq, managed_by=tripleo_ansible, com.redhat.component=openstack-rabbitmq-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, name=rhosp17/openstack-rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.12) Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Dec 3 09:09:11 np0005543225 systemd[1]: Started libpod-conmon-7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a.scope. Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Dec 3 09:09:11 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:11 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/73663df69c91f99d2a32fd1c9cb71c2d908bba43113b2a74ee7e34927c2469a1/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:11 np0005543225 podman[66736]: 2025-12-03 09:09:11.922555398 +0000 UTC m=+0.463592870 container init 7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, io.buildah.version=1.41.4, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp17/openstack-rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, version=17.1.12, io.openshift.expose-services=, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-rabbitmq-container, tcib_managed=true, distribution-scope=public, url=https://www.redhat.com, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:49:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, architecture=x86_64) Dec 3 09:09:11 np0005543225 podman[66736]: 2025-12-03 09:09:11.934921216 +0000 UTC m=+0.475958668 container start 7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, io.buildah.version=1.41.4, com.redhat.component=openstack-rabbitmq-container, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, name=rhosp17/openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, architecture=x86_64, vendor=Red Hat, Inc., url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 rabbitmq, managed_by=tripleo_ansible, container_name=container-puppet-rabbitmq, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vcs-type=git, description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T22:49:50Z, distribution-scope=public) Dec 3 09:09:11 np0005543225 podman[66736]: 2025-12-03 09:09:11.935184174 +0000 UTC m=+0.476221696 container attach 7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, build-date=2025-11-18T22:49:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, name=rhosp17/openstack-rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, managed_by=tripleo_ansible, io.openshift.expose-services=, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., release=1761123044, description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, version=17.1.12, io.buildah.version=1.41.4, container_name=container-puppet-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/instance_name_template]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/enabled_apis]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}b9623034a6caf6171943ab6ba3663f20682025983716dbd50aac8d15ef7fe459' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Nova_config[wsgi/api_paste_config]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen_port]/ensure: created Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:11 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:11 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_workers]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Nova_config[api/use_forwarded_for]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Nova_config[api/max_limit]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/allow_resize_to_same_host]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:12 np0005543225 podman[66825]: 2025-12-03 09:09:12.104198258 +0000 UTC m=+0.085603333 container create 0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, vcs-type=git, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.buildah.version=1.41.4, container_name=container-puppet-redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-redis, build-date=2025-11-18T22:49:49Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 redis, managed_by=tripleo_ansible, com.redhat.component=openstack-redis-container) Dec 3 09:09:12 np0005543225 systemd[1]: Started libpod-conmon-0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a.scope. Dec 3 09:09:12 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:12 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d411d6a255f6a0f83c4bb8b889ad9108ea1cc407c59b9de3f118e0b0814842ad/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:12 np0005543225 podman[66825]: 2025-12-03 09:09:12.15779444 +0000 UTC m=+0.139199515 container init 0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, summary=Red Hat OpenStack Platform 17.1 redis, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-redis, com.redhat.component=openstack-redis-container, tcib_managed=true, io.openshift.expose-services=, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, distribution-scope=public, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-redis, build-date=2025-11-18T22:49:49Z, url=https://www.redhat.com, managed_by=tripleo_ansible, batch=17.1_20251118.1, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Dec 3 09:09:12 np0005543225 podman[66825]: 2025-12-03 09:09:12.061820124 +0000 UTC m=+0.043225249 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 09:09:12 np0005543225 podman[66825]: 2025-12-03 09:09:12.167871518 +0000 UTC m=+0.149276603 container start 0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:49:49Z, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-redis, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-redis-container, release=1761123044, vcs-type=git, container_name=container-puppet-redis, tcib_managed=true, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, url=https://www.redhat.com, architecture=x86_64, maintainer=OpenStack TripleO Team) Dec 3 09:09:12 np0005543225 podman[66825]: 2025-12-03 09:09:12.168162375 +0000 UTC m=+0.149567490 container attach 0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, summary=Red Hat OpenStack Platform 17.1 redis, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, url=https://www.redhat.com, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 redis, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-redis, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-redis, com.redhat.component=openstack-redis-container, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, distribution-scope=public, build-date=2025-11-18T22:49:49Z, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, release=1761123044, vendor=Red Hat, Inc., version=17.1.12) Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Conductor/Nova_config[conductor/workers]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/workers]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/discover_hosts_in_cells_interval]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_image_type_support]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/limit_tenants_to_placement_aggregate]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/placement_aggregate_required_for_tenants]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/enable_isolated_aggregate_filtering]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66462]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:12 np0005543225 puppet-user[66462]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:12 np0005543225 puppet-user[66462]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:12 np0005543225 puppet-user[66462]: (file & line not available) Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_availability_zone]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_routed_network_aggregates]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 systemd[1]: tmp-crun.HcTvjX.mount: Deactivated successfully. Dec 3 09:09:12 np0005543225 puppet-user[66462]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:12 np0005543225 puppet-user[66462]: (file & line not available) Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/host_subset_size]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/weight_classes]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Metadata/Nova_config[api/local_metadata_per_cell]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/service_metadata_proxy]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/shuffle_best_same_weighed_hosts]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/metadata_proxy_shared_secret]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_ca_certs]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_cert]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_key]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_host]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_port]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[66462]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.28 seconds Dec 3 09:09:12 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/auth_schemes]/ensure: created Dec 3 09:09:12 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[66922]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:172.17.0.103:6642,ssl:172.17.0.104:6642,ssl:172.17.0.105:6642 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[66926]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-type]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[66930]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=172.19.0.103 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-ip]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[66935]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005543225.ooo.test Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:hostname]/value: value changed 'np0005543225.novalocal' to 'np0005543225.ooo.test' Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[66944]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[66948]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote-probe-interval]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[66958]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-openflow-probe-interval]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[66979]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=true Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-monitor-all]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[67004]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-ofctrl-wait-before-clear]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[67010]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-tos=0 Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-tos]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66703]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:13 np0005543225 puppet-user[66703]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:13 np0005543225 puppet-user[66703]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:13 np0005543225 puppet-user[66703]: (file & line not available) Dec 3 09:09:13 np0005543225 ovs-vsctl[67012]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-chassis-mac-mappings=datacentre:fa:16:3e:93:82:b6 Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66703]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:13 np0005543225 puppet-user[66703]: (file & line not available) Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-chassis-mac-mappings]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[67015]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=datacentre:br-ex Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge-mappings]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[67017]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-match-northd-version]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:13 np0005543225 ovs-vsctl[67021]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:garp-max-timeout-sec=0 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:garp-max-timeout-sec]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66462]: Notice: Applied catalog in 0.58 seconds Dec 3 09:09:13 np0005543225 puppet-user[66462]: Application: Dec 3 09:09:13 np0005543225 puppet-user[66462]: Initial environment: production Dec 3 09:09:13 np0005543225 puppet-user[66462]: Converged environment: production Dec 3 09:09:13 np0005543225 puppet-user[66462]: Run mode: user Dec 3 09:09:13 np0005543225 puppet-user[66462]: Changes: Dec 3 09:09:13 np0005543225 puppet-user[66462]: Total: 14 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Events: Dec 3 09:09:13 np0005543225 puppet-user[66462]: Success: 14 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Total: 14 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Resources: Dec 3 09:09:13 np0005543225 puppet-user[66462]: Skipped: 12 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Changed: 14 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Out of sync: 14 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Total: 29 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Time: Dec 3 09:09:13 np0005543225 puppet-user[66462]: Exec: 0.02 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Config retrieval: 0.32 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Vs config: 0.51 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Transaction evaluation: 0.57 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Catalog application: 0.58 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Last run: 1764752953 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Total: 0.59 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Version: Dec 3 09:09:13 np0005543225 puppet-user[66462]: Config: 1764752952 Dec 3 09:09:13 np0005543225 puppet-user[66462]: Puppet: 7.10.0 Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Dec 3 09:09:13 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Dec 3 09:09:14 np0005543225 systemd[1]: libpod-8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99.scope: Deactivated successfully. Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Dec 3 09:09:14 np0005543225 systemd[1]: libpod-8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99.scope: Consumed 3.257s CPU time. Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Dec 3 09:09:14 np0005543225 podman[67119]: 2025-12-03 09:09:14.079557269 +0000 UTC m=+0.042153460 container died 8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.4, io.openshift.expose-services=, name=rhosp17/openstack-ovn-controller, maintainer=OpenStack TripleO Team, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-ovn_controller, com.redhat.component=openstack-ovn-controller-container, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, distribution-scope=public, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, release=1761123044, build-date=2025-11-18T23:34:05Z) Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:14 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:14 np0005543225 systemd[1]: var-lib-containers-storage-overlay-39d0618885746765fa8701f291b53c50a4caa34e167c1ba8a10ca8e8e396fa7c-merged.mount: Deactivated successfully. Dec 3 09:09:14 np0005543225 podman[67119]: 2025-12-03 09:09:14.147633905 +0000 UTC m=+0.110230056 container cleanup 8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99 (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, com.redhat.component=openstack-ovn-controller-container, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, name=rhosp17/openstack-ovn-controller, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, architecture=x86_64, release=1761123044, batch=17.1_20251118.1, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, build-date=2025-11-18T23:34:05Z, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-type=git, container_name=container-puppet-ovn_controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, version=17.1.12) Dec 3 09:09:14 np0005543225 systemd[1]: libpod-conmon-8ae9457f39c3f7f2e87e779550edf755331f54b7399f00b5199c80167681dd99.scope: Deactivated successfully. Dec 3 09:09:14 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ovn_controller --conmon-pidfile /run/container-puppet-ovn_controller.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,vs_config,exec --env NAME=ovn_controller --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::agents::ovn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ovn_controller --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ovn_controller.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /etc/sysconfig/modules:/etc/sysconfig/modules --volume /lib/modules:/lib/modules:ro --volume /run/openvswitch:/run/openvswitch:shared,z --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66703]: Warning: Scope(Apache::Vhost[placement_wsgi]): Dec 3 09:09:14 np0005543225 puppet-user[66703]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:14 np0005543225 puppet-user[66703]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:14 np0005543225 puppet-user[66703]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:14 np0005543225 puppet-user[66703]: file names. Dec 3 09:09:14 np0005543225 puppet-user[66703]: Dec 3 09:09:14 np0005543225 puppet-user[66703]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:14 np0005543225 puppet-user[66703]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:14 np0005543225 puppet-user[66703]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.23 seconds Dec 3 09:09:14 np0005543225 podman[67212]: 2025-12-03 09:09:14.577701676 +0000 UTC m=+0.104868894 container create 0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-rsyslog-container, url=https://www.redhat.com, config_id=tripleo_puppet_step1, version=17.1.12, build-date=2025-11-18T22:49:49Z, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, container_name=container-puppet-rsyslog, vcs-type=git, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, io.openshift.expose-services=) Dec 3 09:09:14 np0005543225 systemd[1]: Started libpod-conmon-0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb.scope. Dec 3 09:09:14 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:14 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7af75a0e487e0091ec2bd90af669001c5263796ab038a3b445e7e222bd5edd87/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Dec 3 09:09:14 np0005543225 podman[67212]: 2025-12-03 09:09:14.63442162 +0000 UTC m=+0.161588838 container init 0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, build-date=2025-11-18T22:49:49Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-rsyslog, name=rhosp17/openstack-rsyslog, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, config_id=tripleo_puppet_step1, com.redhat.component=openstack-rsyslog-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, managed_by=tripleo_ansible, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044) Dec 3 09:09:14 np0005543225 podman[67212]: 2025-12-03 09:09:14.535984209 +0000 UTC m=+0.063151467 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Dec 3 09:09:14 np0005543225 podman[67212]: 2025-12-03 09:09:14.64344595 +0000 UTC m=+0.170613178 container start 0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-rsyslog-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, version=17.1.12, release=1761123044, description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, container_name=container-puppet-rsyslog, io.openshift.expose-services=, vendor=Red Hat, Inc., batch=17.1_20251118.1, distribution-scope=public, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-rsyslog, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.buildah.version=1.41.4, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog) Dec 3 09:09:14 np0005543225 podman[67212]: 2025-12-03 09:09:14.643687236 +0000 UTC m=+0.170854474 container attach 0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:49Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.openshift.expose-services=, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, architecture=x86_64, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-rsyslog, version=17.1.12, com.redhat.component=openstack-rsyslog-container, description=Red Hat OpenStack Platform 17.1 rsyslog, release=1761123044, distribution-scope=public, batch=17.1_20251118.1, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog) Dec 3 09:09:14 np0005543225 puppet-user[66855]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:14 np0005543225 puppet-user[66855]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:14 np0005543225 puppet-user[66855]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:14 np0005543225 puppet-user[66855]: (file & line not available) Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_scope]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_new_defaults]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66855]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:14 np0005543225 puppet-user[66855]: (file & line not available) Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Api/Oslo::Middleware[nova_config]/Nova_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[nova_metadata_wsgi]/ensure: defined content as '{sha256}7311c9047eec89f1e952197038ebb53e3ab5810905e7292a2f802c7e4fc0351c' Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Cron::Archive_deleted_rows/Cron[nova-manage db archive_deleted_rows]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Cron::Purge_shadow_tables/Cron[nova-manage db purge]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/Apache::Vhost[nova_metadata_wsgi]/Concat[10-nova_metadata_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_metadata_wsgi.conf]/ensure: defined content as '{sha256}184f1c1b3a8f535f8e3dd1dddd787fa0655e35f351c28056642d9adf9f87ffe1' Dec 3 09:09:14 np0005543225 puppet-user[66053]: Notice: Applied catalog in 3.36 seconds Dec 3 09:09:14 np0005543225 puppet-user[66053]: Application: Dec 3 09:09:14 np0005543225 puppet-user[66053]: Initial environment: production Dec 3 09:09:14 np0005543225 puppet-user[66053]: Converged environment: production Dec 3 09:09:14 np0005543225 puppet-user[66053]: Run mode: user Dec 3 09:09:14 np0005543225 puppet-user[66053]: Changes: Dec 3 09:09:14 np0005543225 puppet-user[66053]: Total: 126 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Events: Dec 3 09:09:14 np0005543225 puppet-user[66053]: Success: 126 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Total: 126 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Resources: Dec 3 09:09:14 np0005543225 puppet-user[66053]: Changed: 126 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Out of sync: 126 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Skipped: 37 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Total: 421 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Time: Dec 3 09:09:14 np0005543225 puppet-user[66053]: Concat file: 0.00 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Anchor: 0.00 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Concat fragment: 0.00 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Augeas: 0.04 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Package: 0.05 Dec 3 09:09:14 np0005543225 puppet-user[66053]: File: 0.37 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Config retrieval: 1.73 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Last run: 1764752954 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Nova config: 2.62 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Transaction evaluation: 3.35 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Catalog application: 3.36 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Resources: 0.00 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Total: 3.36 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Version: Dec 3 09:09:14 np0005543225 puppet-user[66053]: Config: 1764752949 Dec 3 09:09:14 np0005543225 puppet-user[66053]: Puppet: 7.10.0 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/debug]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_file]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/Apache::Vhost[nova_api_wsgi]/Concat[10-nova_api_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_api_wsgi.conf]/ensure: defined content as '{sha256}d0a39012f7bd951229da7bebcd89c9c6e74a312fbcf6ba5324b2fda9b5151297' Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Db/Oslo::Db[placement_config]/Placement_config[placement_database/connection]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[65656]: Notice: Applied catalog in 4.27 seconds Dec 3 09:09:14 np0005543225 puppet-user[65656]: Application: Dec 3 09:09:14 np0005543225 puppet-user[65656]: Initial environment: production Dec 3 09:09:14 np0005543225 puppet-user[65656]: Converged environment: production Dec 3 09:09:14 np0005543225 puppet-user[65656]: Run mode: user Dec 3 09:09:14 np0005543225 puppet-user[65656]: Changes: Dec 3 09:09:14 np0005543225 puppet-user[65656]: Total: 156 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Events: Dec 3 09:09:14 np0005543225 puppet-user[65656]: Success: 156 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Total: 156 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Resources: Dec 3 09:09:14 np0005543225 puppet-user[65656]: Changed: 156 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Out of sync: 156 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Skipped: 51 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Total: 517 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Time: Dec 3 09:09:14 np0005543225 puppet-user[65656]: Anchor: 0.00 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Concat file: 0.00 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Concat fragment: 0.00 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Augeas: 0.02 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Package: 0.03 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Cron: 0.05 Dec 3 09:09:14 np0005543225 puppet-user[65656]: File: 0.20 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Last run: 1764752954 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Config retrieval: 2.02 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Nova config: 3.54 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Transaction evaluation: 4.25 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Catalog application: 4.27 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Resources: 0.00 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Total: 4.28 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Version: Dec 3 09:09:14 np0005543225 puppet-user[65656]: Config: 1764752948 Dec 3 09:09:14 np0005543225 puppet-user[65656]: Puppet: 7.10.0 Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:14 np0005543225 puppet-user[66855]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66855]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.41 seconds Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}6b9e264b98904ed2b91698acece035be22dc961ad94895907d4f82a66e7e2c6a' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:15 np0005543225 puppet-user[66855]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Redis_bundle/File[/etc/redis-tls.conf]/ensure: defined content as '{sha256}70c2507b747d7400b45c01a6f628c75a26142a98f6395fbe84c0d913dd79860c' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:15 np0005543225 puppet-user[66855]: Notice: /Stage[main]/Tripleo::Stunnel/Concat[/etc/stunnel/stunnel.conf]/File[/etc/stunnel/stunnel.conf]/ensure: defined content as '{sha256}f0207bb04fdeddf79a00dd589cc6516213eda49e7fa1538c5ac918984dbc294c' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:15 np0005543225 puppet-user[66855]: Notice: /Stage[main]/Redis::Config/File[/etc/redis]/mode: mode changed '0750' to '0755' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:15 np0005543225 puppet-user[66855]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/security/limits.d/redis.conf]/ensure: defined content as '{sha256}4723daf91256d1c55ef938214e69b3359209d2df79c3dceb8b8352faf4c8886d' Dec 3 09:09:15 np0005543225 puppet-user[66855]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/systemd/system/redis.service.d/limit.conf]/mode: mode changed '0644' to '0444' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_scope]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_new_defaults]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66855]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/File[/etc/redis.conf.puppet]/ensure: defined content as '{sha256}e5545f66c17b370e1ba8eeca39ac196b5929c535f8267dad088b6f3ed11dbd11' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Wsgi::Apache/File[/etc/httpd/conf.d/00-placement-api.conf]/content: content changed '{sha256}829e74856246ff8f4a56a4995cd421edd210e3c0342c998de9e934d33c2d229f' to '{sha256}a742a33fca7bd0225b70d9c9c3f9977f3f5b1391a7c4db389c2e405e7a0e7ecc' Dec 3 09:09:15 np0005543225 puppet-user[66855]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/Exec[cp -p /etc/redis.conf.puppet /etc/redis.conf]: Triggered 'refresh' from 1 event Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[/var/www/cgi-bin/placement]/ensure: created Dec 3 09:09:15 np0005543225 puppet-user[66855]: Notice: Applied catalog in 0.09 seconds Dec 3 09:09:15 np0005543225 puppet-user[66855]: Application: Dec 3 09:09:15 np0005543225 puppet-user[66855]: Initial environment: production Dec 3 09:09:15 np0005543225 puppet-user[66855]: Converged environment: production Dec 3 09:09:15 np0005543225 puppet-user[66855]: Run mode: user Dec 3 09:09:15 np0005543225 puppet-user[66855]: Changes: Dec 3 09:09:15 np0005543225 puppet-user[66855]: Total: 7 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Events: Dec 3 09:09:15 np0005543225 puppet-user[66855]: Success: 7 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Total: 7 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Resources: Dec 3 09:09:15 np0005543225 puppet-user[66855]: Restarted: 1 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Skipped: 14 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Changed: 7 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Out of sync: 7 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Total: 30 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Time: Dec 3 09:09:15 np0005543225 puppet-user[66855]: Exec: 0.00 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Concat fragment: 0.00 Dec 3 09:09:15 np0005543225 puppet-user[66855]: File: 0.02 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Augeas: 0.03 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Transaction evaluation: 0.09 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Catalog application: 0.09 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Config retrieval: 0.45 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Last run: 1764752955 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Concat file: 0.00 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Total: 0.09 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Version: Dec 3 09:09:15 np0005543225 puppet-user[66855]: Config: 1764752954 Dec 3 09:09:15 np0005543225 puppet-user[66855]: Puppet: 7.10.0 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[placement_wsgi]/ensure: defined content as '{sha256}7330573e2f484b77671e7cd10bec4bf8fe4471ba5a127b8362286c6c89a050fe' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/Apache::Vhost[placement_wsgi]/Concat[10-placement_wsgi.conf]/File[/etc/httpd/conf.d/10-placement_wsgi.conf]/ensure: defined content as '{sha256}e9ade371e1c4c9754253b02a8194906a1559efb3fd44624954482427008631ea' Dec 3 09:09:15 np0005543225 puppet-user[66703]: Notice: Applied catalog in 0.58 seconds Dec 3 09:09:15 np0005543225 puppet-user[66703]: Application: Dec 3 09:09:15 np0005543225 puppet-user[66703]: Initial environment: production Dec 3 09:09:15 np0005543225 puppet-user[66703]: Converged environment: production Dec 3 09:09:15 np0005543225 puppet-user[66703]: Run mode: user Dec 3 09:09:15 np0005543225 puppet-user[66703]: Changes: Dec 3 09:09:15 np0005543225 puppet-user[66703]: Total: 63 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Events: Dec 3 09:09:15 np0005543225 puppet-user[66703]: Success: 63 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Total: 63 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Resources: Dec 3 09:09:15 np0005543225 puppet-user[66703]: Skipped: 31 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Changed: 63 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Out of sync: 63 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Total: 208 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Time: Dec 3 09:09:15 np0005543225 puppet-user[66703]: Concat file: 0.00 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Anchor: 0.00 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Concat fragment: 0.00 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Augeas: 0.02 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Package: 0.03 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Placement config: 0.13 Dec 3 09:09:15 np0005543225 puppet-user[66703]: File: 0.15 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Transaction evaluation: 0.57 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Catalog application: 0.58 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Config retrieval: 1.35 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Last run: 1764752955 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Total: 0.58 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Version: Dec 3 09:09:15 np0005543225 puppet-user[66703]: Config: 1764752953 Dec 3 09:09:15 np0005543225 puppet-user[66703]: Puppet: 7.10.0 Dec 3 09:09:15 np0005543225 systemd[1]: libpod-0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a.scope: Deactivated successfully. Dec 3 09:09:15 np0005543225 systemd[1]: libpod-0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a.scope: Consumed 3.108s CPU time. Dec 3 09:09:15 np0005543225 podman[66825]: 2025-12-03 09:09:15.555751846 +0000 UTC m=+3.537156931 container died 0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, build-date=2025-11-18T22:49:49Z, managed_by=tripleo_ansible, architecture=x86_64, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, name=rhosp17/openstack-redis, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-redis, description=Red Hat OpenStack Platform 17.1 redis, config_id=tripleo_puppet_step1, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-redis-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc.) Dec 3 09:09:15 np0005543225 systemd[1]: tmp-crun.9WX0FR.mount: Deactivated successfully. Dec 3 09:09:15 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:15 np0005543225 systemd[1]: var-lib-containers-storage-overlay-d411d6a255f6a0f83c4bb8b889ad9108ea1cc407c59b9de3f118e0b0814842ad-merged.mount: Deactivated successfully. Dec 3 09:09:15 np0005543225 systemd[1]: libpod-e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8.scope: Deactivated successfully. Dec 3 09:09:15 np0005543225 systemd[1]: libpod-e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8.scope: Consumed 7.445s CPU time. Dec 3 09:09:15 np0005543225 systemd[1]: libpod-d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca.scope: Deactivated successfully. Dec 3 09:09:15 np0005543225 systemd[1]: libpod-d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca.scope: Consumed 4.085s CPU time. Dec 3 09:09:15 np0005543225 podman[66612]: 2025-12-03 09:09:15.895245513 +0000 UTC m=+4.796367240 container died d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 placement-api, maintainer=OpenStack TripleO Team, release=1761123044, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, distribution-scope=public, batch=17.1_20251118.1, version=17.1.12, description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, architecture=x86_64, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-placement, managed_by=tripleo_ansible, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, name=rhosp17/openstack-placement-api, com.redhat.component=openstack-placement-api-container, build-date=2025-11-18T23:41:26Z, vcs-type=git) Dec 3 09:09:15 np0005543225 podman[67459]: 2025-12-03 09:09:15.950193941 +0000 UTC m=+0.384331038 container cleanup 0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-redis, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, io.buildah.version=1.41.4, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-redis, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, release=1761123044, config_id=tripleo_puppet_step1, com.redhat.component=openstack-redis-container, url=https://www.redhat.com, managed_by=tripleo_ansible, build-date=2025-11-18T22:49:49Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 redis, summary=Red Hat OpenStack Platform 17.1 redis, tcib_managed=true) Dec 3 09:09:15 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-redis --conmon-pidfile /run/container-puppet-redis.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,exec --env NAME=redis --env STEP_CONFIG=include ::tripleo::packages#012Exec <| title == 'systemd-reload-redis' |> { unless => 'true' }#012include tripleo::profile::pacemaker::database::redis_bundle#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-redis --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-redis.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 09:09:15 np0005543225 systemd[1]: libpod-conmon-0f10be3edc8bdfea99463431321d61eecb29a3a1489f1f0d276e92418a527b8a.scope: Deactivated successfully. Dec 3 09:09:15 np0005543225 podman[65994]: 2025-12-03 09:09:15.997704222 +0000 UTC m=+8.380316301 container died e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, name=rhosp17/openstack-nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 nova-api, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, version=17.1.12, release=1761123044, container_name=container-puppet-nova_metadata, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, url=https://www.redhat.com, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-api-container, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, build-date=2025-11-19T00:34:57Z) Dec 3 09:09:16 np0005543225 podman[67536]: 2025-12-03 09:09:16.066867876 +0000 UTC m=+0.158638079 container cleanup d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-placement-api-container, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 placement-api, container_name=container-puppet-placement, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, tcib_managed=true, distribution-scope=public, release=1761123044, name=rhosp17/openstack-placement-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vendor=Red Hat, Inc., build-date=2025-11-18T23:41:26Z, io.openshift.expose-services=, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, vcs-type=git, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 placement-api) Dec 3 09:09:16 np0005543225 systemd[1]: libpod-0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9.scope: Deactivated successfully. Dec 3 09:09:16 np0005543225 systemd[1]: libpod-0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9.scope: Consumed 8.773s CPU time. Dec 3 09:09:16 np0005543225 systemd[1]: libpod-conmon-d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca.scope: Deactivated successfully. Dec 3 09:09:16 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-placement --conmon-pidfile /run/container-puppet-placement.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,placement_config --env NAME=placement --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::placement::api --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-placement --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-placement.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Dec 3 09:09:16 np0005543225 systemd[1]: var-lib-containers-storage-overlay-b229295d0df5440a40679e8a95e77b5c1dc97a8bc2cd058149233a0853850499-merged.mount: Deactivated successfully. Dec 3 09:09:16 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d565e8ccb8d44650e3c2c9fd6ef435498b22eb614f2a18e2f094b5be4756f9ca-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:16 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:16 np0005543225 systemd[1]: var-lib-containers-storage-overlay-30d62ba9dab8ba6b202aab198fad49c4455f5a260b67e97db57939f6bd15a288-merged.mount: Deactivated successfully. Dec 3 09:09:16 np0005543225 puppet-user[66823]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:16 np0005543225 puppet-user[66823]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:16 np0005543225 puppet-user[66823]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:16 np0005543225 puppet-user[66823]: (file & line not available) Dec 3 09:09:16 np0005543225 podman[67535]: 2025-12-03 09:09:16.112752485 +0000 UTC m=+0.205029181 container cleanup e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, batch=17.1_20251118.1, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, build-date=2025-11-19T00:34:57Z, architecture=x86_64, distribution-scope=public, vcs-type=git, container_name=container-puppet-nova_metadata, name=rhosp17/openstack-nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, vendor=Red Hat, Inc., release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, version=17.1.12, description=Red Hat OpenStack Platform 17.1 nova-api) Dec 3 09:09:16 np0005543225 systemd[1]: libpod-conmon-e0583e422e89b1da7db3242bc57dd9dc1dbcf2becf618b473b4dccb4731b79b8.scope: Deactivated successfully. Dec 3 09:09:16 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova_metadata --conmon-pidfile /run/container-puppet-nova_metadata.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini --env NAME=nova_metadata --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::nova::metadata#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova_metadata --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova_metadata.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:16 np0005543225 puppet-user[66823]: (file & line not available) Dec 3 09:09:16 np0005543225 podman[65566]: 2025-12-03 09:09:16.178111908 +0000 UTC m=+9.718351942 container died 0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.buildah.version=1.41.4, tcib_managed=true, container_name=container-puppet-nova, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, maintainer=OpenStack TripleO Team, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, architecture=x86_64, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, build-date=2025-11-19T00:34:57Z, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-nova-api, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, release=1761123044, summary=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, batch=17.1_20251118.1, url=https://www.redhat.com, com.redhat.component=openstack-nova-api-container) Dec 3 09:09:16 np0005543225 podman[67641]: 2025-12-03 09:09:16.213228431 +0000 UTC m=+0.129147738 container cleanup 0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-19T00:34:57Z, distribution-scope=public, vcs-type=git, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, managed_by=tripleo_ansible, tcib_managed=true, release=1761123044, summary=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.4, url=https://www.redhat.com, config_id=tripleo_puppet_step1, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.openshift.expose-services=, name=rhosp17/openstack-nova-api, architecture=x86_64, container_name=container-puppet-nova, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:16 np0005543225 systemd[1]: libpod-conmon-0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9.scope: Deactivated successfully. Dec 3 09:09:16 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova --conmon-pidfile /run/container-puppet-nova.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config --env NAME=nova --env STEP_CONFIG=include ::tripleo::packages#012['Nova_cell_v2'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::nova::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::conductor#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::vncproxy#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Warning: Unknown variable: '::pacemaker::pcs_010'. (file: /etc/puppet/modules/pacemaker/manifests/resource/bundle.pp, line: 159, column: 6) Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.39 seconds Dec 3 09:09:16 np0005543225 podman[67781]: 2025-12-03 09:09:16.515696296 +0000 UTC m=+0.089752273 container create dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, build-date=2025-11-19T00:12:50Z, distribution-scope=public, io.buildah.version=1.41.4, tcib_managed=true, release=1761123044, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-type=git, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, config_id=tripleo_puppet_step1, container_name=container-puppet-swift, managed_by=tripleo_ansible, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-swift-proxy-server-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server) Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq]/mode: mode changed '0755' to '2755' Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Tripleo::Profile::Base::Rabbitmq/File[/etc/rabbitmq/ssl-dist.conf]/ensure: defined content as '{sha256}4fcb8b2c0ce7c31ae2a64808de62371e284138a67310e23f1c73dbf139a874c7' Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq/ssl]/ensure: created Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-env.config]/ensure: defined content as '{sha256}2c581416ae0139f7986624fc466ae1913765a441dd142d48dfb98ba6adc92449' Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-inetrc]/ensure: defined content as '{sha256}b83b8080dbcdf2a49fff2f747972e7343801f7518a0f1dcb3e2a301e50aef551' Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Rabbitmq::Config/File[enabled_plugins]/ensure: defined content as '{sha256}3b5c9fba2f1456d923499fc142bc9ef7a7f6d53d6bc4c0ae88310332eb10a31c' Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/security/limits.d/rabbitmq-server.conf]/ensure: defined content as '{sha256}b984a5f0a62696715f206ca0a602fd9d2d497894c6c24502896fb3010ee0c557' Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq.config]/ensure: defined content as '{sha256}49e02f804b9140f200d9cd14ee42f8cd8f9acbfe3e4cebe12b1d1c483bd90b6b' Dec 3 09:09:16 np0005543225 puppet-user[67330]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:16 np0005543225 puppet-user[67330]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:16 np0005543225 systemd[1]: Started libpod-conmon-dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8.scope. Dec 3 09:09:16 np0005543225 puppet-user[67330]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:16 np0005543225 puppet-user[67330]: (file & line not available) Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File[/var/lib/rabbitmq/.erlang.cookie]/content: content changed '{sha256}c2eb73347a2aaad1544bd050582b9e029434253e3ba50e4c8812895a8306c52d' to '{sha256}99fcff85571df09bef220d538fe3a8b2e3ea19a1b6434bc9b894584557f39b35' Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-systemd]/ensure: removed Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-succeed]/ensure: created Dec 3 09:09:16 np0005543225 puppet-user[66823]: Notice: Applied catalog in 0.06 seconds Dec 3 09:09:16 np0005543225 puppet-user[66823]: Application: Dec 3 09:09:16 np0005543225 puppet-user[66823]: Initial environment: production Dec 3 09:09:16 np0005543225 puppet-user[66823]: Converged environment: production Dec 3 09:09:16 np0005543225 puppet-user[66823]: Run mode: user Dec 3 09:09:16 np0005543225 puppet-user[66823]: Changes: Dec 3 09:09:16 np0005543225 puppet-user[66823]: Total: 11 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Events: Dec 3 09:09:16 np0005543225 puppet-user[66823]: Success: 11 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Total: 11 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Resources: Dec 3 09:09:16 np0005543225 puppet-user[66823]: Changed: 11 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Out of sync: 11 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Skipped: 17 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Total: 28 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Time: Dec 3 09:09:16 np0005543225 puppet-user[66823]: File line: 0.00 Dec 3 09:09:16 np0005543225 puppet-user[66823]: File: 0.03 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Transaction evaluation: 0.06 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Catalog application: 0.06 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Config retrieval: 0.43 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Last run: 1764752956 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Total: 0.06 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Version: Dec 3 09:09:16 np0005543225 puppet-user[66823]: Config: 1764752956 Dec 3 09:09:16 np0005543225 puppet-user[66823]: Puppet: 7.10.0 Dec 3 09:09:16 np0005543225 podman[67781]: 2025-12-03 09:09:16.464505837 +0000 UTC m=+0.038561844 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 09:09:16 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:16 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0d9840aa5c54e8195c071b71166311129bdeb0a1ad0171c84b04fd1cab0e4646/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:16 np0005543225 puppet-user[67330]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:16 np0005543225 puppet-user[67330]: (file & line not available) Dec 3 09:09:16 np0005543225 podman[67781]: 2025-12-03 09:09:16.584903251 +0000 UTC m=+0.158959238 container init dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, com.redhat.component=openstack-swift-proxy-server-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, release=1761123044, build-date=2025-11-19T00:12:50Z, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, container_name=container-puppet-swift, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.buildah.version=1.41.4, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., name=rhosp17/openstack-swift-proxy-server, version=17.1.12) Dec 3 09:09:16 np0005543225 podman[67781]: 2025-12-03 09:09:16.592505153 +0000 UTC m=+0.166561100 container start dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, release=1761123044, managed_by=tripleo_ansible, name=rhosp17/openstack-swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-swift-proxy-server-container, url=https://www.redhat.com, io.openshift.expose-services=, distribution-scope=public, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., container_name=container-puppet-swift, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, build-date=2025-11-19T00:12:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:09:16 np0005543225 podman[67781]: 2025-12-03 09:09:16.594816085 +0000 UTC m=+0.168872122 container attach dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, io.openshift.expose-services=, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-proxy-server-container, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, distribution-scope=public, vcs-type=git, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, build-date=2025-11-19T00:12:50Z, container_name=container-puppet-swift, batch=17.1_20251118.1, name=rhosp17/openstack-swift-proxy-server, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, version=17.1.12, config_id=tripleo_puppet_step1) Dec 3 09:09:16 np0005543225 podman[67858]: 2025-12-03 09:09:16.639362967 +0000 UTC m=+0.088542161 container create 8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, release=1761123044, vendor=Red Hat, Inc., tcib_managed=true, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, container_name=container-puppet-swift_ringbuilder, maintainer=OpenStack TripleO Team, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:12:50Z, com.redhat.component=openstack-swift-proxy-server-container, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-swift-proxy-server, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Dec 3 09:09:16 np0005543225 systemd[1]: Started libpod-conmon-8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca.scope. Dec 3 09:09:16 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:16 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/794903852bd12ea8b157ef9f2f75412f15bc426479754455852c962b060289b2/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:16 np0005543225 podman[67858]: 2025-12-03 09:09:16.690314978 +0000 UTC m=+0.139494172 container init 8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, com.redhat.component=openstack-swift-proxy-server-container, name=rhosp17/openstack-swift-proxy-server, build-date=2025-11-19T00:12:50Z, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, url=https://www.redhat.com, batch=17.1_20251118.1, container_name=container-puppet-swift_ringbuilder, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, architecture=x86_64, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.buildah.version=1.41.4, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Dec 3 09:09:16 np0005543225 podman[67858]: 2025-12-03 09:09:16.594695282 +0000 UTC m=+0.043874476 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 09:09:16 np0005543225 podman[67858]: 2025-12-03 09:09:16.703653393 +0000 UTC m=+0.152832587 container start 8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, com.redhat.component=openstack-swift-proxy-server-container, container_name=container-puppet-swift_ringbuilder, io.buildah.version=1.41.4, release=1761123044, vcs-type=git, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, architecture=x86_64, distribution-scope=public, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, vendor=Red Hat, Inc., url=https://www.redhat.com, build-date=2025-11-19T00:12:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-swift-proxy-server) Dec 3 09:09:16 np0005543225 podman[67858]: 2025-12-03 09:09:16.704142315 +0000 UTC m=+0.153321509 container attach 8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, architecture=x86_64, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1761123044, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.buildah.version=1.41.4, com.redhat.component=openstack-swift-proxy-server-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-swift-proxy-server, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:12:50Z, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, managed_by=tripleo_ansible, io.openshift.expose-services=) Dec 3 09:09:16 np0005543225 systemd[1]: libpod-7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a.scope: Deactivated successfully. Dec 3 09:09:16 np0005543225 systemd[1]: libpod-7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a.scope: Consumed 5.472s CPU time. Dec 3 09:09:16 np0005543225 podman[66736]: 2025-12-03 09:09:16.907183882 +0000 UTC m=+5.448221394 container died 7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:49:50Z, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, version=17.1.12, com.redhat.component=openstack-rabbitmq-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, batch=17.1_20251118.1, url=https://www.redhat.com, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.4, name=rhosp17/openstack-rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-rabbitmq) Dec 3 09:09:16 np0005543225 puppet-user[67330]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.42 seconds Dec 3 09:09:17 np0005543225 podman[67940]: 2025-12-03 09:09:17.019222025 +0000 UTC m=+0.097496257 container cleanup 7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T22:49:50Z, com.redhat.component=openstack-rabbitmq-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.12, container_name=container-puppet-rabbitmq, architecture=x86_64, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, name=rhosp17/openstack-rabbitmq, vcs-type=git, config_id=tripleo_puppet_step1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc.) Dec 3 09:09:17 np0005543225 systemd[1]: libpod-conmon-7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a.scope: Deactivated successfully. Dec 3 09:09:17 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rabbitmq --conmon-pidfile /run/container-puppet-rabbitmq.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file,file_line --env NAME=rabbitmq --env STEP_CONFIG=include ::tripleo::packages#012['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::rabbitmq_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rabbitmq --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rabbitmq.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 09:09:17 np0005543225 systemd[1]: tmp-crun.oRMi54.mount: Deactivated successfully. Dec 3 09:09:17 np0005543225 systemd[1]: var-lib-containers-storage-overlay-73663df69c91f99d2a32fd1c9cb71c2d908bba43113b2a74ee7e34927c2469a1-merged.mount: Deactivated successfully. Dec 3 09:09:17 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-7bc45aa621d7a32b4ce12c3b0bed230a49a9f63f03f6b8c8dfd17190f6947c2a-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:17 np0005543225 systemd[1]: var-lib-containers-storage-overlay-328236d374814997d43e0986cd4a0f963cffe19ec558157dc33c7fa08fc847e7-merged.mount: Deactivated successfully. Dec 3 09:09:17 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-0cf82087b7d5e80d277e84f889f22e91374ed61ea72f1f8b71f56342d7b175d9-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:17 np0005543225 puppet-user[67330]: Notice: /Stage[main]/Rsyslog::Base/File[/etc/rsyslog.conf]/content: content changed '{sha256}d6f679f6a4eb6f33f9fc20c846cb30bef93811e1c86bc4da1946dc3100b826c3' to '{sha256}7963bd801fadd49a17561f4d3f80738c3f504b413b11c443432d8303138041f2' Dec 3 09:09:17 np0005543225 puppet-user[67330]: Notice: /Stage[main]/Rsyslog::Config::Global/Rsyslog::Component::Global_config[MaxMessageSize]/Rsyslog::Generate_concat[rsyslog::concat::global_config::MaxMessageSize]/Concat[/etc/rsyslog.d/00_rsyslog.conf]/File[/etc/rsyslog.d/00_rsyslog.conf]/ensure: defined content as '{sha256}a291d5cc6d5884a978161f4c7b5831d43edd07797cc590bae366e7f150b8643b' Dec 3 09:09:17 np0005543225 puppet-user[67330]: Notice: /Stage[main]/Rsyslog::Config::Templates/Rsyslog::Component::Template[rsyslog-node-index]/Rsyslog::Generate_concat[rsyslog::concat::template::rsyslog-node-index]/Concat[/etc/rsyslog.d/50_openstack_logs.conf]/File[/etc/rsyslog.d/50_openstack_logs.conf]/ensure: defined content as '{sha256}9fcfbb08683693308688de85e25c39c6f05315203a448bdfc210bd3203cdef32' Dec 3 09:09:17 np0005543225 puppet-user[67330]: Notice: Applied catalog in 0.18 seconds Dec 3 09:09:17 np0005543225 puppet-user[67330]: Application: Dec 3 09:09:17 np0005543225 puppet-user[67330]: Initial environment: production Dec 3 09:09:17 np0005543225 puppet-user[67330]: Converged environment: production Dec 3 09:09:17 np0005543225 puppet-user[67330]: Run mode: user Dec 3 09:09:17 np0005543225 puppet-user[67330]: Changes: Dec 3 09:09:17 np0005543225 puppet-user[67330]: Total: 3 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Events: Dec 3 09:09:17 np0005543225 puppet-user[67330]: Success: 3 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Total: 3 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Resources: Dec 3 09:09:17 np0005543225 puppet-user[67330]: Skipped: 11 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Changed: 3 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Out of sync: 3 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Total: 45 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Time: Dec 3 09:09:17 np0005543225 puppet-user[67330]: Concat file: 0.00 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Concat fragment: 0.00 Dec 3 09:09:17 np0005543225 puppet-user[67330]: File: 0.01 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Transaction evaluation: 0.17 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Catalog application: 0.18 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Config retrieval: 0.49 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Last run: 1764752957 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Total: 0.18 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Version: Dec 3 09:09:17 np0005543225 puppet-user[67330]: Config: 1764752956 Dec 3 09:09:17 np0005543225 puppet-user[67330]: Puppet: 7.10.0 Dec 3 09:09:17 np0005543225 systemd[1]: libpod-0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb.scope: Deactivated successfully. Dec 3 09:09:17 np0005543225 systemd[1]: libpod-0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb.scope: Consumed 2.781s CPU time. Dec 3 09:09:17 np0005543225 podman[67212]: 2025-12-03 09:09:17.543027583 +0000 UTC m=+3.070194841 container died 0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, io.openshift.expose-services=, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.component=openstack-rsyslog-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, name=rhosp17/openstack-rsyslog, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, tcib_managed=true, vcs-type=git, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., architecture=x86_64, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, container_name=container-puppet-rsyslog) Dec 3 09:09:17 np0005543225 systemd[1]: tmp-crun.v8aAwn.mount: Deactivated successfully. Dec 3 09:09:17 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:17 np0005543225 podman[68012]: 2025-12-03 09:09:17.667980528 +0000 UTC m=+0.112294620 container cleanup 0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, managed_by=tripleo_ansible, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-rsyslog, io.openshift.expose-services=, vendor=Red Hat, Inc., name=rhosp17/openstack-rsyslog, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 rsyslog, url=https://www.redhat.com, version=17.1.12, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:49Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 rsyslog, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.component=openstack-rsyslog-container, architecture=x86_64, batch=17.1_20251118.1) Dec 3 09:09:17 np0005543225 systemd[1]: libpod-conmon-0b5b992f330b8698be219a28024b69057babf20f933e88a664915aeb34b577cb.scope: Deactivated successfully. Dec 3 09:09:17 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rsyslog --conmon-pidfile /run/container-puppet-rsyslog.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment --env NAME=rsyslog --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::rsyslog --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rsyslog --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rsyslog.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Dec 3 09:09:18 np0005543225 systemd[1]: var-lib-containers-storage-overlay-7af75a0e487e0091ec2bd90af669001c5263796ab038a3b445e7e222bd5edd87-merged.mount: Deactivated successfully. Dec 3 09:09:18 np0005543225 puppet-user[67892]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:18 np0005543225 puppet-user[67892]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:18 np0005543225 puppet-user[67892]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:18 np0005543225 puppet-user[67892]: (file & line not available) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:18 np0005543225 puppet-user[67914]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:18 np0005543225 puppet-user[67914]: (file & line not available) Dec 3 09:09:18 np0005543225 puppet-user[67892]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:18 np0005543225 puppet-user[67892]: (file & line not available) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:18 np0005543225 puppet-user[67914]: (file & line not available) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Dec 3 09:09:18 np0005543225 puppet-user[67914]: Warning: validate_legacy(validate_re) expects an Integer value, got String at ["/etc/puppet/modules/swift/manifests/ringbuilder/rebalance.pp", 23]: Dec 3 09:09:18 np0005543225 puppet-user[67914]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Dec 3 09:09:18 np0005543225 puppet-user[67914]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 0.34 seconds Dec 3 09:09:19 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Dec 3 09:09:19 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Dec 3 09:09:19 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Dec 3 09:09:19 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to fKFsZIlHbmQpoGrXfErG3odhD Dec 3 09:09:19 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Dec 3 09:09:19 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Dec 3 09:09:19 np0005543225 puppet-user[67892]: Warning: Scope(Class[Swift::Proxy::S3token]): Usage of the default password is deprecated and will be removed in a future release. \ Dec 3 09:09:19 np0005543225 puppet-user[67892]: Please set password parameter Dec 3 09:09:19 np0005543225 puppet-user[67892]: Warning: Scope(Class[Swift::Keymaster]): password parameter is missing Dec 3 09:09:19 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[object]/Exec[create_object]/returns: executed successfully Dec 3 09:09:19 np0005543225 puppet-user[67892]: Warning: Scope(Class[Swift::Storage::All]): The default port for the object storage server has changed \ Dec 3 09:09:19 np0005543225 puppet-user[67892]: from 6000 to 6200 and will be changed in a later release Dec 3 09:09:19 np0005543225 puppet-user[67892]: Warning: Scope(Class[Swift::Storage::All]): The default port for the container storage server has changed \ Dec 3 09:09:19 np0005543225 puppet-user[67892]: from 6001 to 6201 and will be changed in a later release Dec 3 09:09:19 np0005543225 puppet-user[67892]: Warning: Scope(Class[Swift::Storage::All]): The default port for the account storage server has changed \ Dec 3 09:09:19 np0005543225 puppet-user[67892]: from 6002 to 6202 and will be changed in a later release Dec 3 09:09:19 np0005543225 puppet-user[67892]: Warning: Scope(Apache::Vhost[swift-proxy-api-proxy]): Dec 3 09:09:19 np0005543225 puppet-user[67892]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:19 np0005543225 puppet-user[67892]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:19 np0005543225 puppet-user[67892]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:19 np0005543225 puppet-user[67892]: file names. Dec 3 09:09:19 np0005543225 puppet-user[67892]: Dec 3 09:09:19 np0005543225 puppet-user[67892]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:19 np0005543225 puppet-user[67892]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:19 np0005543225 puppet-user[67892]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:19 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[account]/Exec[create_account]/returns: executed successfully Dec 3 09:09:19 np0005543225 puppet-user[67892]: Notice: Compiled catalog for np0005543225.ooo.test in environment production in 1.29 seconds Dec 3 09:09:20 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[container]/Exec[create_container]/returns: executed successfully Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}9b09fb609dd34c410cd09afce1c9ecf0b423566c600b084ecab9ed536f2431bc' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}7a0d21683d3990f8d5e59e716ecbd1c96f562a2a65073818970e9fa5b82a52b8' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:20 np0005543225 puppet-user[67914]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:20 np0005543225 puppet-user[67914]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:20 np0005543225 puppet-user[67914]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Rsync::Server/Concat[/etc/rsyncd.conf]/File[/etc/rsyncd.conf]/content: content changed '{sha256}189b30972178b755e8e70eab81b1d261c4def61b342300f11760e6f2e706ff64' to '{sha256}90c63bb71937e23a3b5e7a17b0b45511de89d0c1ec387c4f6f9be1aadf919d02' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Rsync::Server/Service[rsyncd]/ensure: ensure changed 0 to 'running' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005543225.internalapi.ooo.test:11212,np0005543226.internalapi.ooo.test:11212,np0005543227.internalapi.ooo.test:11212 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/tls_enabled]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:proxy-logging/use]/value: value changed egg:swift#poxy_logging to egg:swift#proxy_logging Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[pipeline:main/pipeline]/value: value changed catch_errors proxy-logging cache proxy-server to catch_errors cache proxy-server Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/auto_create_account_prefix]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/concurrency]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/expiring_objects_account_name]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/interval]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/process]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/processes]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/reclaim_age]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/recon_cache_path]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/report_interval]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_facility]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_level]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to fKFsZIlHbmQpoGrXfErG3odhD Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/bind_ip]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/workers]/value: value changed 8 to 1 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_name]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_facility]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_level]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_headers]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_address]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[pipeline:main/pipeline]/value: value changed catch_errors gatekeeper healthcheck proxy-logging cache container_sync bulk tempurl ratelimit copy container-quotas account-quotas slo dlo versioned_writes proxy-logging proxy-server to catch_errors gatekeeper healthcheck proxy-logging cache listing_formats ratelimit bulk tempurl formpost authtoken s3api s3token keystone staticweb copy container_quotas account_quotas slo dlo versioned_writes proxy-logging proxy-server Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_name]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_facility]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_level]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_address]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/log_handoffs]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/object_chunk_size]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/client_chunk_size]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/allow_account_management]/value: value changed true to True Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/account_autocreate]/value: value changed true to True Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/max_containers_per_account]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/node_timeout]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/recoverable_node_timeout]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_name]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_facility]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_level]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_headers]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_address]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005543225.internalapi.ooo.test:11212,np0005543226.internalapi.ooo.test:11212,np0005543227.internalapi.ooo.test:11212 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/tls_enabled]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_max_connections]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Listing_formats/Swift_proxy_config[filter:listing_formats/use]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/clock_accuracy]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/max_sleep_time_seconds]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/log_sleep_time_seconds]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/rate_buffer_seconds]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/account_ratelimit]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_containers_per_extraction]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_failed_extractions]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_deletes_per_request]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/yield_frequency]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Formpost/Swift_proxy_config[filter:formpost/use]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/log_name]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_url]/value: value changed http://127.0.0.1:5000 to https://overcloud.internalapi.ooo.test:5000 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_type]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_domain_id]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/user_domain_id]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_name]/value: value changed %SERVICE_TENANT_NAME% to service Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/username]/value: value changed %SERVICE_USER% to swift Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/password]/value: value changed [old secret redacted] to [new secret redacted] Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/region_name]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/delay_auth_decision]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/cache]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/include_service_catalog]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/interface]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/use]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/auth_pipeline_check]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/use]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_uri]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/reseller_prefix]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/delay_auth_decision]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/secret_cache_duration]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_url]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_type]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/username]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/password]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_name]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_domain_id]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/user_domain_id]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_object_device[172.20.0.103:6000/d1]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/operator_roles]/value: value changed admin, SwiftOperator to admin, swiftoperator, ResellerAdmin Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/reseller_prefix]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/system_reader_roles]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/use]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/url_base]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Copy/Swift_proxy_config[filter:copy/object_post_as_copy]/value: value changed false to True Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Container_quotas/Swift_proxy_config[filter:container_quotas/use]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Account_quotas/Swift_proxy_config[filter:account_quotas/use]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_segments]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_size]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/min_segment_size]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_after_segment]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_segments_per_sec]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_get_time]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_after_segment]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_segments_per_sec]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/max_get_time]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Versioned_writes/Swift_proxy_config[filter:versioned_writes/allow_versioned_writes]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/use]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/keymaster_config_path]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/use]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/disable_encryption]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/api_class]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/username]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_name]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_domain_id]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/user_domain_id]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/meta_version_to_write]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node/d1]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Storage::Account/Swift::Storage::Generic[account]/File[/etc/swift/account-server/]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Storage::Container/Swift::Storage::Generic[container]/File[/etc/swift/container-server/]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Storage::Object/Swift::Storage::Generic[object]/File[/etc/swift/object-server/]/ensure: created Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6002]/Concat[/etc/swift/account-server.conf]/File[/etc/swift/account-server.conf]/ensure: defined content as '{sha256}ab6f11adca14e1165e4d4c1d5bab4b6e5237d623caaab6a446d063152c67e23a' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6001]/Concat[/etc/swift/container-server.conf]/File[/etc/swift/container-server.conf]/ensure: defined content as '{sha256}ecf2abeae1b74f4d454509e9962cefd253254cece1670b9780b1353f66f76b0e' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6000]/Concat[/etc/swift/object-server.conf]/File[/etc/swift/object-server.conf]/ensure: defined content as '{sha256}d37844c1efb04899848315d60b8da4dc0c8a84c5194b35da4abf6ed9eabea067' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Proxy/Tripleo::Tls_proxy[swift-proxy-api]/Apache::Vhost[swift-proxy-api-proxy]/Concat[25-swift-proxy-api-proxy.conf]/File[/etc/httpd/conf.d/25-swift-proxy-api-proxy.conf]/ensure: defined content as '{sha256}a1caaa61c514a79278d757337b5e4baab7b5057569f19d39d1e708c80b2b79d2' Dec 3 09:09:20 np0005543225 puppet-user[67892]: Notice: Applied catalog in 0.77 seconds Dec 3 09:09:20 np0005543225 puppet-user[67892]: Application: Dec 3 09:09:20 np0005543225 puppet-user[67892]: Initial environment: production Dec 3 09:09:20 np0005543225 puppet-user[67892]: Converged environment: production Dec 3 09:09:20 np0005543225 puppet-user[67892]: Run mode: user Dec 3 09:09:20 np0005543225 puppet-user[67892]: Changes: Dec 3 09:09:20 np0005543225 puppet-user[67892]: Total: 163 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Events: Dec 3 09:09:20 np0005543225 puppet-user[67892]: Success: 163 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Total: 163 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Resources: Dec 3 09:09:20 np0005543225 puppet-user[67892]: Changed: 163 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Out of sync: 163 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Skipped: 46 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Total: 330 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Time: Dec 3 09:09:20 np0005543225 puppet-user[67892]: Concat file: 0.00 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Service: 0.00 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Swift config: 0.00 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Concat fragment: 0.00 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Swift keymaster config: 0.01 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Swift object expirer config: 0.02 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Package: 0.04 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Swift proxy config: 0.16 Dec 3 09:09:20 np0005543225 puppet-user[67892]: File: 0.21 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Transaction evaluation: 0.75 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Catalog application: 0.77 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Config retrieval: 1.56 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Last run: 1764752960 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Resources: 0.00 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Total: 0.77 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Version: Dec 3 09:09:20 np0005543225 puppet-user[67892]: Config: 1764752958 Dec 3 09:09:20 np0005543225 puppet-user[67892]: Puppet: 7.10.0 Dec 3 09:09:21 np0005543225 puppet-user[67914]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:21 np0005543225 puppet-user[67914]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:21 np0005543225 puppet-user[67914]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Dec 3 09:09:21 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_container_device[172.20.0.103:6001/d1]/ensure: created Dec 3 09:09:21 np0005543225 systemd[1]: libpod-dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8.scope: Deactivated successfully. Dec 3 09:09:21 np0005543225 systemd[1]: libpod-dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8.scope: Consumed 4.873s CPU time. Dec 3 09:09:21 np0005543225 podman[67781]: 2025-12-03 09:09:21.668610365 +0000 UTC m=+5.242666332 container died dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, build-date=2025-11-19T00:12:50Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, vendor=Red Hat, Inc., version=17.1.12, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, distribution-scope=public, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, config_id=tripleo_puppet_step1, release=1761123044, container_name=container-puppet-swift, com.redhat.component=openstack-swift-proxy-server-container, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, tcib_managed=true, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:09:21 np0005543225 systemd[1]: tmp-crun.lRNZ9R.mount: Deactivated successfully. Dec 3 09:09:21 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:21 np0005543225 systemd[1]: var-lib-containers-storage-overlay-0d9840aa5c54e8195c071b71166311129bdeb0a1ad0171c84b04fd1cab0e4646-merged.mount: Deactivated successfully. Dec 3 09:09:21 np0005543225 podman[68237]: 2025-12-03 09:09:21.800168425 +0000 UTC m=+0.122492201 container cleanup dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8 (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, name=rhosp17/openstack-swift-proxy-server, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1761123044, url=https://www.redhat.com, config_id=tripleo_puppet_step1, version=17.1.12, tcib_managed=true, io.openshift.expose-services=, build-date=2025-11-19T00:12:50Z, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.buildah.version=1.41.4, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-swift, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, architecture=x86_64, managed_by=tripleo_ansible) Dec 3 09:09:21 np0005543225 systemd[1]: libpod-conmon-dcd28dc38f780ae324b2f2f0b2598de3ffee38e2bd29b2849b50f578927132d8.scope: Deactivated successfully. Dec 3 09:09:21 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift --conmon-pidfile /run/container-puppet-swift.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server --env NAME=swift --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::proxy#012#012class xinetd() {}#012define xinetd::service($bind='',$port='',$server='',$server_args='') {}#012noop_resource('service')#012include tripleo::profile::base::swift::storage --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 09:09:21 np0005543225 puppet-user[67914]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:21 np0005543225 puppet-user[67914]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:21 np0005543225 puppet-user[67914]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Dec 3 09:09:22 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_account_device[172.20.0.103:6002/d1]/ensure: created Dec 3 09:09:22 np0005543225 sshd[68281]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:09:22 np0005543225 puppet-user[67914]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:22 np0005543225 puppet-user[67914]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:22 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_object_device[172.20.0.104:6000/d1]/ensure: created Dec 3 09:09:23 np0005543225 puppet-user[67914]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:23 np0005543225 puppet-user[67914]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:23 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_container_device[172.20.0.104:6001/d1]/ensure: created Dec 3 09:09:23 np0005543225 puppet-user[67914]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:23 np0005543225 puppet-user[67914]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:24 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_account_device[172.20.0.104:6002/d1]/ensure: created Dec 3 09:09:24 np0005543225 puppet-user[67914]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:24 np0005543225 puppet-user[67914]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:24 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_object_device[172.20.0.105:6000/d1]/ensure: created Dec 3 09:09:24 np0005543225 puppet-user[67914]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:24 np0005543225 puppet-user[67914]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:25 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_container_device[172.20.0.105:6001/d1]/ensure: created Dec 3 09:09:25 np0005543225 puppet-user[67914]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:25 np0005543225 puppet-user[67914]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:25 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_account_device[172.20.0.105:6002/d1]/ensure: created Dec 3 09:09:26 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[object]/Exec[rebalance_object]: Triggered 'refresh' from 3 events Dec 3 09:09:26 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[account]/Exec[rebalance_account]: Triggered 'refresh' from 3 events Dec 3 09:09:26 np0005543225 puppet-user[67914]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[container]/Exec[rebalance_container]: Triggered 'refresh' from 3 events Dec 3 09:09:26 np0005543225 puppet-user[67914]: Notice: Applied catalog in 7.94 seconds Dec 3 09:09:26 np0005543225 puppet-user[67914]: Application: Dec 3 09:09:26 np0005543225 puppet-user[67914]: Initial environment: production Dec 3 09:09:26 np0005543225 puppet-user[67914]: Converged environment: production Dec 3 09:09:26 np0005543225 puppet-user[67914]: Run mode: user Dec 3 09:09:26 np0005543225 puppet-user[67914]: Changes: Dec 3 09:09:26 np0005543225 puppet-user[67914]: Total: 21 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Events: Dec 3 09:09:26 np0005543225 puppet-user[67914]: Success: 21 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Total: 21 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Resources: Dec 3 09:09:26 np0005543225 puppet-user[67914]: Skipped: 16 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Changed: 21 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Out of sync: 21 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Restarted: 3 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Total: 38 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Time: Dec 3 09:09:26 np0005543225 puppet-user[67914]: File: 0.00 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Swift config: 0.01 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Config retrieval: 0.41 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Exec: 1.01 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Ring account device: 1.88 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Ring object device: 1.93 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Ring container device: 1.94 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Last run: 1764752966 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Transaction evaluation: 7.93 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Catalog application: 7.94 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Total: 7.94 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Version: Dec 3 09:09:26 np0005543225 puppet-user[67914]: Config: 1764752958 Dec 3 09:09:26 np0005543225 puppet-user[67914]: Puppet: 7.10.0 Dec 3 09:09:27 np0005543225 systemd[1]: libpod-8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca.scope: Deactivated successfully. Dec 3 09:09:27 np0005543225 systemd[1]: libpod-8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca.scope: Consumed 10.555s CPU time. Dec 3 09:09:27 np0005543225 podman[68346]: 2025-12-03 09:09:27.43202118 +0000 UTC m=+0.059354276 container died 8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, architecture=x86_64, com.redhat.component=openstack-swift-proxy-server-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, batch=17.1_20251118.1, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, container_name=container-puppet-swift_ringbuilder, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, build-date=2025-11-19T00:12:50Z, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, name=rhosp17/openstack-swift-proxy-server, release=1761123044) Dec 3 09:09:27 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:27 np0005543225 systemd[1]: var-lib-containers-storage-overlay-794903852bd12ea8b157ef9f2f75412f15bc426479754455852c962b060289b2-merged.mount: Deactivated successfully. Dec 3 09:09:27 np0005543225 podman[68346]: 2025-12-03 09:09:27.492251879 +0000 UTC m=+0.119584945 container cleanup 8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-swift_ringbuilder, release=1761123044, io.buildah.version=1.41.4, vendor=Red Hat, Inc., com.redhat.component=openstack-swift-proxy-server-container, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, build-date=2025-11-19T00:12:50Z, tcib_managed=true, url=https://www.redhat.com, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, architecture=x86_64, config_id=tripleo_puppet_step1) Dec 3 09:09:27 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:27 np0005543225 systemd[1]: libpod-conmon-8cb56d1fd4d78e42693ec753277b5cfd7a65bdea7f121590a80a3a01143593ca.scope: Deactivated successfully. Dec 3 09:09:27 np0005543225 python3[62463]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift_ringbuilder --conmon-pidfile /run/container-puppet-swift_ringbuilder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543225 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball --env NAME=swift_ringbuilder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::ringbuilder#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift_ringbuilder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543225', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift_ringbuilder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 09:09:28 np0005543225 python3[68400]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:29 np0005543225 python3[68432]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:09:30 np0005543225 python3[68482]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:30 np0005543225 python3[68525]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752969.7490504-174625-133389194422919/source dest=/usr/libexec/tripleo-container-shutdown mode=0700 owner=root group=root _original_basename=tripleo-container-shutdown follow=False checksum=7d67b1986212f5548057505748cd74cfcf9c0d35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:31 np0005543225 python3[68587]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:31 np0005543225 python3[68630]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752970.7369342-174625-201721361049882/source dest=/usr/libexec/tripleo-start-podman-container mode=0700 owner=root group=root _original_basename=tripleo-start-podman-container follow=False checksum=536965633b8d3b1ce794269ffb07be0105a560a0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:32 np0005543225 python3[68692]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:32 np0005543225 python3[68735]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752971.9321823-174711-240596745508384/source dest=/usr/lib/systemd/system/tripleo-container-shutdown.service mode=0644 owner=root group=root _original_basename=tripleo-container-shutdown-service follow=False checksum=66c1d41406ba8714feb9ed0a35259a7a57ef9707 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:33 np0005543225 python3[68797]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:33 np0005543225 python3[68840]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752972.9779656-174743-122985085150309/source dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset mode=0644 owner=root group=root _original_basename=91-tripleo-container-shutdown-preset follow=False checksum=bccb1207dcbcfaa5ca05f83c8f36ce4c2460f081 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:34 np0005543225 python3[68870]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:34 np0005543225 systemd[1]: Reloading. Dec 3 09:09:34 np0005543225 systemd-rc-local-generator[68889]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:34 np0005543225 systemd-sysv-generator[68895]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:34 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:34 np0005543225 systemd[1]: Reloading. Dec 3 09:09:34 np0005543225 systemd-rc-local-generator[68934]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:34 np0005543225 systemd-sysv-generator[68938]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:34 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:34 np0005543225 systemd[1]: Starting TripleO Container Shutdown... Dec 3 09:09:34 np0005543225 systemd[1]: Finished TripleO Container Shutdown. Dec 3 09:09:35 np0005543225 python3[68993]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:35 np0005543225 python3[69036]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752975.0633626-174869-35042274266893/source dest=/usr/lib/systemd/system/netns-placeholder.service mode=0644 owner=root group=root _original_basename=netns-placeholder-service follow=False checksum=8e9c6d5ce3a6e7f71c18780ec899f32f23de4c71 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:36 np0005543225 python3[69098]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:36 np0005543225 python3[69141]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752976.1230705-174895-181967056276319/source dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset mode=0644 owner=root group=root _original_basename=91-netns-placeholder-preset follow=False checksum=28b7b9aa893525d134a1eeda8a0a48fb25b736b9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:37 np0005543225 python3[69171]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:37 np0005543225 systemd[1]: Reloading. Dec 3 09:09:37 np0005543225 systemd-rc-local-generator[69196]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:37 np0005543225 systemd-sysv-generator[69203]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:37 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:37 np0005543225 systemd[1]: Reloading. Dec 3 09:09:37 np0005543225 systemd-sysv-generator[69239]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:37 np0005543225 systemd-rc-local-generator[69235]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:37 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:37 np0005543225 systemd[1]: Starting Create netns directory... Dec 3 09:09:38 np0005543225 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Dec 3 09:09:38 np0005543225 systemd[1]: netns-placeholder.service: Deactivated successfully. Dec 3 09:09:38 np0005543225 systemd[1]: Finished Create netns directory. Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for memcached, new hash: 7cabf7af6dffa9451de7685929b15d94 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for metrics_qdr, new hash: 7f48172939798f4b816a45ed0bc7723b Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for mysql_bootstrap, new hash: a68876231f633b6eaee2ab03868b782b Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for rabbitmq_bootstrap, new hash: 02c0357f42f63c9da1fc88a4e7c8d6ab Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for redis_tls_proxy, new hash: 19bf83a87910ea969c930c2f5cd8a192 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for clustercheck, new hash: 9fcee9ebd9bb4ca7ffa7ebec8cca0eee Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for horizon_fix_perms, new hash: 2030feeefa13fb5e2914f598b36d19af Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for mysql_wait_bundle, new hash: a68876231f633b6eaee2ab03868b782b Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_db_sync, new hash: 7c8983b0686e306672250fee0e986777 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for collectd, new hash: e16153973e33c69ef6071b3b67d72d70 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_db_sync, new hash: f539eaae5823f6e452b4f780fb441331-5ca4d0ed8d51dd6e6c22f9b34ec2d159 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine_db_sync, new hash: 45b99060e5fba3647fe9daadc4339c1f Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for horizon, new hash: 2030feeefa13fb5e2914f598b36d19af Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for iscsid, new hash: 5ca4d0ed8d51dd6e6c22f9b34ec2d159 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for keystone, new hash: 7624d781a1250f47080c3d816e3a5e21 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for keystone_cron, new hash: 7624d781a1250f47080c3d816e3a5e21 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for keystone_db_sync, new hash: 7624d781a1250f47080c3d816e3a5e21 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_db_sync, new hash: 223fb4ab8e7432a1abbaac7d40484a22 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for neutron_db_sync, new hash: 690918a27b989344e6cadd87297cae50 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_db_sync, new hash: 9a0721fa2b1208bf0c4b28b9d1121ac7 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_ensure_default_cells, new hash: 9a0721fa2b1208bf0c4b28b9d1121ac7 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_db_sync, new hash: 9a0721fa2b1208bf0c4b28b9d1121ac7 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for placement_api_db_sync, new hash: 8c0b108f725c23ee351eb150fd093928 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for rsyslog, new hash: 78e9d60469a7113456f4c84b7ef90154 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_copy_rings, new hash: fc552889997bd26082cffa46b578c8e8-b2d3643d16cefc3e23c40490fa0df0d6 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_central, new hash: dbede0bc39a73bfffd328c851b51e826 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_notification, new hash: dbede0bc39a73bfffd328c851b51e826 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api, new hash: 7c8983b0686e306672250fee0e986777 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_cron, new hash: 7c8983b0686e306672250fee0e986777 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for cinder_scheduler, new hash: 7c8983b0686e306672250fee0e986777 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for glance_api, new hash: f539eaae5823f6e452b4f780fb441331-5ca4d0ed8d51dd6e6c22f9b34ec2d159 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_cron, new hash: f539eaae5823f6e452b4f780fb441331 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal, new hash: 97920adb65d6f317077951e3e70c392c-5ca4d0ed8d51dd6e6c22f9b34ec2d159 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal_tls_proxy, new hash: 97920adb65d6f317077951e3e70c392c Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_tls_proxy, new hash: f539eaae5823f6e452b4f780fb441331 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for heat_api, new hash: 757ac58a8ac98d0b10fb603b382650e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cfn, new hash: 5a6e6e4e768764feaea03bc27f265231 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cron, new hash: 757ac58a8ac98d0b10fb603b382650e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine, new hash: 45b99060e5fba3647fe9daadc4339c1f Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for logrotate_crond, new hash: 53ed83bb0cae779ff95edb2002262c6f Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for manila_api, new hash: 223fb4ab8e7432a1abbaac7d40484a22 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_cron, new hash: 223fb4ab8e7432a1abbaac7d40484a22 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for manila_scheduler, new hash: 223fb4ab8e7432a1abbaac7d40484a22 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for neutron_api, new hash: 690918a27b989344e6cadd87297cae50 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for neutron_server_tls_proxy, new hash: 690918a27b989344e6cadd87297cae50 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_api, new hash: 9a0721fa2b1208bf0c4b28b9d1121ac7 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_cron, new hash: 9a0721fa2b1208bf0c4b28b9d1121ac7 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_conductor, new hash: 9a0721fa2b1208bf0c4b28b9d1121ac7 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_metadata, new hash: 7fe47f3e8b45d90356a2248676585aec Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_scheduler, new hash: 9a0721fa2b1208bf0c4b28b9d1121ac7 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_vnc_proxy, new hash: 9a0721fa2b1208bf0c4b28b9d1121ac7 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for nova_wait_for_api_service, new hash: 9a0721fa2b1208bf0c4b28b9d1121ac7 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for placement_api, new hash: 8c0b108f725c23ee351eb150fd093928 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for placement_wait_for_service, new hash: 8c0b108f725c23ee351eb150fd093928 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_auditor, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_reaper, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_replicator, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_server, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_auditor, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_replicator, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_server, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_updater, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_auditor, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_expirer, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_replicator, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_server, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_updater, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy_tls_proxy, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:38 np0005543225 python3[69263]: ansible-container_puppet_config [WARNING] Config change detected for swift_rsync, new hash: fc552889997bd26082cffa46b578c8e8 Dec 3 09:09:39 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:39 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:40 np0005543225 python3[69322]: ansible-tripleo_container_manage Invoked with config_id=tripleo_step1 config_dir=/var/lib/tripleo-config/container-startup-config/step_1 config_patterns=*.json config_overrides={} concurrency=5 log_base_path=/var/log/containers/stdouts debug=False Dec 3 09:09:40 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:40 np0005543225 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:40 np0005543225 podman[69455]: 2025-12-03 09:09:40.967966702 +0000 UTC m=+0.086019693 container create b806ce707e2530474d89117601f270791e6bb8ae060a47b5f8f5c650b40f0725 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=rabbitmq_bootstrap, url=https://www.redhat.com, io.buildah.version=1.41.4, config_id=tripleo_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp17/openstack-rabbitmq, build-date=2025-11-18T22:49:50Z, distribution-scope=public, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, batch=17.1_20251118.1, version=17.1.12, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '02c0357f42f63c9da1fc88a4e7c8d6ab'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-rabbitmq-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, vcs-type=git) Dec 3 09:09:41 np0005543225 systemd[1]: Started libpod-conmon-b806ce707e2530474d89117601f270791e6bb8ae060a47b5f8f5c650b40f0725.scope. Dec 3 09:09:41 np0005543225 podman[69455]: 2025-12-03 09:09:40.925129175 +0000 UTC m=+0.043182186 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 09:09:41 np0005543225 podman[69495]: 2025-12-03 09:09:41.024096661 +0000 UTC m=+0.101864473 container create 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, config_id=tripleo_step1, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.openshift.expose-services=, release=1761123044, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, name=rhosp17/openstack-memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:49Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, batch=17.1_20251118.1, vendor=Red Hat, Inc., container_name=memcached) Dec 3 09:09:41 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:41 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d0fd9ad7c5c406460edce0ffa77c715c1e2413679b87bbbe84e221d27f2235ff/merged/var/lib/rabbitmq supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:41 np0005543225 podman[69455]: 2025-12-03 09:09:41.051480238 +0000 UTC m=+0.169533279 container init b806ce707e2530474d89117601f270791e6bb8ae060a47b5f8f5c650b40f0725 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, tcib_managed=true, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-rabbitmq-container, name=rhosp17/openstack-rabbitmq, url=https://www.redhat.com, vendor=Red Hat, Inc., vcs-type=git, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, managed_by=tripleo_ansible, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=rabbitmq_bootstrap, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_step1, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '02c0357f42f63c9da1fc88a4e7c8d6ab'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, architecture=x86_64, build-date=2025-11-18T22:49:50Z, version=17.1.12, distribution-scope=public) Dec 3 09:09:41 np0005543225 podman[69495]: 2025-12-03 09:09:40.953276132 +0000 UTC m=+0.031043974 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 09:09:41 np0005543225 podman[69513]: 2025-12-03 09:09:41.062249254 +0000 UTC m=+0.119099812 container create cc057371f0a6c7882ae9c365c7f8b7f9fdf04774db9a80cbe6cfaf7f1826da72 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '19bf83a87910ea969c930c2f5cd8a192'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, managed_by=tripleo_ansible, tcib_managed=true, name=rhosp17/openstack-redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=redis_tls_proxy, config_id=tripleo_step1, com.redhat.component=openstack-redis-container, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, release=1761123044, version=17.1.12, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, build-date=2025-11-18T22:49:49Z) Dec 3 09:09:41 np0005543225 systemd[1]: Started libpod-conmon-97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2.scope. Dec 3 09:09:41 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:41 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f538831d4e3592c76be274a38b931e9f9bcef0ebb7ef2bdeb384d830c38047e8/merged/var/log/memcached supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:41 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f538831d4e3592c76be274a38b931e9f9bcef0ebb7ef2bdeb384d830c38047e8/merged/var/lib/kolla/config_files/src supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:41 np0005543225 podman[69497]: 2025-12-03 09:09:41.093653047 +0000 UTC m=+0.152545908 container create b7bf51218247b7bf9fe2235d1430468fc5e73a3791f4854cad707f63c88ccdb6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-mariadb, batch=17.1_20251118.1, vcs-type=git, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, container_name=mysql_data_ownership, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, vendor=Red Hat, Inc., build-date=2025-11-18T22:51:13Z, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.buildah.version=1.41.4) Dec 3 09:09:41 np0005543225 podman[69513]: 2025-12-03 09:09:40.99989879 +0000 UTC m=+0.056749338 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 09:09:41 np0005543225 podman[69497]: 2025-12-03 09:09:41.00068847 +0000 UTC m=+0.059581331 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:09:41 np0005543225 podman[69524]: 2025-12-03 09:09:41.005922929 +0000 UTC m=+0.046064293 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:41 np0005543225 podman[69455]: 2025-12-03 09:09:41.114227182 +0000 UTC m=+0.232280183 container start b806ce707e2530474d89117601f270791e6bb8ae060a47b5f8f5c650b40f0725 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, io.buildah.version=1.41.4, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, com.redhat.component=openstack-rabbitmq-container, batch=17.1_20251118.1, distribution-scope=public, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '02c0357f42f63c9da1fc88a4e7c8d6ab'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, container_name=rabbitmq_bootstrap, name=rhosp17/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:49:50Z, vendor=Red Hat, Inc.) Dec 3 09:09:41 np0005543225 python3[69322]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name rabbitmq_bootstrap --conmon-pidfile /run/rabbitmq_bootstrap.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1764748258 --env TRIPLEO_CONFIG_HASH=02c0357f42f63c9da1fc88a4e7c8d6ab --label config_id=tripleo_step1 --label container_name=rabbitmq_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '02c0357f42f63c9da1fc88a4e7c8d6ab'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/rabbitmq_bootstrap.log --network host --privileged=False --user root --volume /var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /var/lib/rabbitmq:/var/lib/rabbitmq:z --volume /etc/puppet:/etc/puppet:ro,z registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 bash -ec kolla_set_configs#012if [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi#012hiera 'rabbitmq::erlang_cookie' > /var/lib/rabbitmq/.erlang.cookie#012chown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie#012chmod 400 /var/lib/rabbitmq/.erlang.cookie Dec 3 09:09:41 np0005543225 systemd[1]: Started libpod-conmon-cc057371f0a6c7882ae9c365c7f8b7f9fdf04774db9a80cbe6cfaf7f1826da72.scope. Dec 3 09:09:41 np0005543225 systemd[1]: Started libpod-conmon-b7bf51218247b7bf9fe2235d1430468fc5e73a3791f4854cad707f63c88ccdb6.scope. Dec 3 09:09:41 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:41 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:41 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f13fff2f704cad23ecaabac486e4e2eeb330274108d55e3ed6119a118322388f/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:41 np0005543225 podman[69524]: 2025-12-03 09:09:41.14769015 +0000 UTC m=+0.187831544 container create 6af348c33cbd9266a81a2113f4f397ff9d400e2087c747c2294e85aa87f943e9 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, build-date=2025-11-18T22:49:46Z, managed_by=tripleo_ansible, io.openshift.expose-services=, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, container_name=metrics_qdr_init_logs, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, name=rhosp17/openstack-qdrouterd, com.redhat.component=openstack-qdrouterd-container, url=https://www.redhat.com, architecture=x86_64, io.buildah.version=1.41.4, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd) Dec 3 09:09:41 np0005543225 podman[69513]: 2025-12-03 09:09:41.159692189 +0000 UTC m=+0.216542737 container init cc057371f0a6c7882ae9c365c7f8b7f9fdf04774db9a80cbe6cfaf7f1826da72 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, build-date=2025-11-18T22:49:49Z, description=Red Hat OpenStack Platform 17.1 redis, version=17.1.12, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, architecture=x86_64, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, managed_by=tripleo_ansible, distribution-scope=public, release=1761123044, io.openshift.expose-services=, vcs-type=git, container_name=redis_tls_proxy, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '19bf83a87910ea969c930c2f5cd8a192'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, summary=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, name=rhosp17/openstack-redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:41 np0005543225 podman[69513]: 2025-12-03 09:09:41.173041843 +0000 UTC m=+0.229892391 container start cc057371f0a6c7882ae9c365c7f8b7f9fdf04774db9a80cbe6cfaf7f1826da72 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, architecture=x86_64, com.redhat.component=openstack-redis-container, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.expose-services=, vendor=Red Hat, Inc., name=rhosp17/openstack-redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, container_name=redis_tls_proxy, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 redis, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, vcs-type=git, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, distribution-scope=public, build-date=2025-11-18T22:49:49Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '19bf83a87910ea969c930c2f5cd8a192'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, config_id=tripleo_step1, maintainer=OpenStack TripleO Team) Dec 3 09:09:41 np0005543225 python3[69322]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name redis_tls_proxy --conmon-pidfile /run/redis_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=19bf83a87910ea969c930c2f5cd8a192 --label config_id=tripleo_step1 --label container_name=redis_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '19bf83a87910ea969c930c2f5cd8a192'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/redis_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro --volume /etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro --volume /var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 09:09:41 np0005543225 systemd[1]: Started /usr/bin/podman healthcheck run 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2. Dec 3 09:09:41 np0005543225 podman[69495]: 2025-12-03 09:09:41.188433052 +0000 UTC m=+0.266200874 container init 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, managed_by=tripleo_ansible, io.openshift.expose-services=, vcs-type=git, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, io.buildah.version=1.41.4, vendor=Red Hat, Inc., com.redhat.component=openstack-memcached-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, release=1761123044, tcib_managed=true, container_name=memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 memcached, name=rhosp17/openstack-memcached) Dec 3 09:09:41 np0005543225 podman[69497]: 2025-12-03 09:09:41.202903375 +0000 UTC m=+0.261796216 container init b7bf51218247b7bf9fe2235d1430468fc5e73a3791f4854cad707f63c88ccdb6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, vcs-type=git, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, distribution-scope=public, container_name=mysql_data_ownership, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, maintainer=OpenStack TripleO Team, architecture=x86_64, name=rhosp17/openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, managed_by=tripleo_ansible, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, url=https://www.redhat.com, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}) Dec 3 09:09:41 np0005543225 podman[69497]: 2025-12-03 09:09:41.21438388 +0000 UTC m=+0.273276711 container start b7bf51218247b7bf9fe2235d1430468fc5e73a3791f4854cad707f63c88ccdb6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_data_ownership, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, managed_by=tripleo_ansible, vendor=Red Hat, Inc., org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-mariadb-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, name=rhosp17/openstack-mariadb, version=17.1.12, architecture=x86_64, batch=17.1_20251118.1, build-date=2025-11-18T22:51:13Z, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, maintainer=OpenStack TripleO Team, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb) Dec 3 09:09:41 np0005543225 podman[69497]: 2025-12-03 09:09:41.214631816 +0000 UTC m=+0.273524657 container attach b7bf51218247b7bf9fe2235d1430468fc5e73a3791f4854cad707f63c88ccdb6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, container_name=mysql_data_ownership, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, distribution-scope=public, tcib_managed=true, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vendor=Red Hat, Inc., build-date=2025-11-18T22:51:13Z, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, io.buildah.version=1.41.4, architecture=x86_64, io.openshift.expose-services=) Dec 3 09:09:41 np0005543225 systemd[1]: libpod-b7bf51218247b7bf9fe2235d1430468fc5e73a3791f4854cad707f63c88ccdb6.scope: Deactivated successfully. Dec 3 09:09:41 np0005543225 systemd[1]: libpod-b806ce707e2530474d89117601f270791e6bb8ae060a47b5f8f5c650b40f0725.scope: Deactivated successfully. Dec 3 09:09:41 np0005543225 podman[69497]: 2025-12-03 09:09:41.220802251 +0000 UTC m=+0.279695112 container died b7bf51218247b7bf9fe2235d1430468fc5e73a3791f4854cad707f63c88ccdb6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, config_id=tripleo_step1, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, managed_by=tripleo_ansible, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, tcib_managed=true, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, container_name=mysql_data_ownership, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, io.buildah.version=1.41.4) Dec 3 09:09:41 np0005543225 systemd[1]: Started /usr/bin/podman healthcheck run 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2. Dec 3 09:09:41 np0005543225 podman[69495]: 2025-12-03 09:09:41.240129643 +0000 UTC m=+0.317897505 container start 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, summary=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, batch=17.1_20251118.1, container_name=memcached, distribution-scope=public, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, release=1761123044, vcs-type=git, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, name=rhosp17/openstack-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:49Z, managed_by=tripleo_ansible, com.redhat.component=openstack-memcached-container, description=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team) Dec 3 09:09:41 np0005543225 python3[69322]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name memcached --conmon-pidfile /run/memcached.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=7cabf7af6dffa9451de7685929b15d94 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=memcached --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/memcached.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z --volume /var/log/containers/memcached:/var/log/memcached:rw --volume /etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro --volume /etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 09:09:41 np0005543225 systemd[1]: Started libpod-conmon-6af348c33cbd9266a81a2113f4f397ff9d400e2087c747c2294e85aa87f943e9.scope. Dec 3 09:09:41 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:41 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/78e4544c0ee78203fd4472c6d24cc14562614b13a24e13599951593714dfe1c1/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:41 np0005543225 podman[69601]: 2025-12-03 09:09:41.324606885 +0000 UTC m=+0.079930692 container health_status 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=starting, container_name=memcached, io.openshift.expose-services=, version=17.1.12, managed_by=tripleo_ansible, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 memcached, build-date=2025-11-18T22:49:49Z, config_id=tripleo_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-memcached-container, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, release=1761123044, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-memcached) Dec 3 09:09:41 np0005543225 podman[69601]: 2025-12-03 09:09:41.334576379 +0000 UTC m=+0.089900186 container exec_died 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, name=rhosp17/openstack-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.12, config_id=tripleo_step1, io.buildah.version=1.41.4, architecture=x86_64, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, build-date=2025-11-18T22:49:49Z, url=https://www.redhat.com, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, com.redhat.component=openstack-memcached-container, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, maintainer=OpenStack TripleO Team, release=1761123044, distribution-scope=public) Dec 3 09:09:41 np0005543225 systemd[1]: 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2.service: Deactivated successfully. Dec 3 09:09:41 np0005543225 podman[69567]: 2025-12-03 09:09:41.354159929 +0000 UTC m=+0.218009826 container died b806ce707e2530474d89117601f270791e6bb8ae060a47b5f8f5c650b40f0725 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.4, name=rhosp17/openstack-rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=rabbitmq_bootstrap, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, release=1761123044, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '02c0357f42f63c9da1fc88a4e7c8d6ab'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, vcs-type=git, version=17.1.12, build-date=2025-11-18T22:49:50Z, description=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, url=https://www.redhat.com, com.redhat.component=openstack-rabbitmq-container, batch=17.1_20251118.1, config_id=tripleo_step1) Dec 3 09:09:41 np0005543225 podman[69524]: 2025-12-03 09:09:41.385948952 +0000 UTC m=+0.426090326 container init 6af348c33cbd9266a81a2113f4f397ff9d400e2087c747c2294e85aa87f943e9 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, description=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-11-18T22:49:46Z, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, container_name=metrics_qdr_init_logs, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, vcs-type=git, io.buildah.version=1.41.4, url=https://www.redhat.com, distribution-scope=public, vendor=Red Hat, Inc., managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Dec 3 09:09:41 np0005543225 podman[69524]: 2025-12-03 09:09:41.396768589 +0000 UTC m=+0.436909983 container start 6af348c33cbd9266a81a2113f4f397ff9d400e2087c747c2294e85aa87f943e9 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, build-date=2025-11-18T22:49:46Z, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-qdrouterd, config_id=tripleo_step1, com.redhat.component=openstack-qdrouterd-container, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, container_name=metrics_qdr_init_logs, vendor=Red Hat, Inc., release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, version=17.1.12, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.buildah.version=1.41.4, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 qdrouterd) Dec 3 09:09:41 np0005543225 podman[69524]: 2025-12-03 09:09:41.398397592 +0000 UTC m=+0.438538976 container attach 6af348c33cbd9266a81a2113f4f397ff9d400e2087c747c2294e85aa87f943e9 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, com.redhat.component=openstack-qdrouterd-container, vcs-type=git, managed_by=tripleo_ansible, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr_init_logs, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, version=17.1.12, release=1761123044, name=rhosp17/openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-11-18T22:49:46Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:09:41 np0005543225 systemd[1]: libpod-6af348c33cbd9266a81a2113f4f397ff9d400e2087c747c2294e85aa87f943e9.scope: Deactivated successfully. Dec 3 09:09:41 np0005543225 podman[69606]: 2025-12-03 09:09:41.633142571 +0000 UTC m=+0.392243238 container cleanup b806ce707e2530474d89117601f270791e6bb8ae060a47b5f8f5c650b40f0725 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, config_id=tripleo_step1, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '02c0357f42f63c9da1fc88a4e7c8d6ab'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, version=17.1.12, distribution-scope=public, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, release=1761123044, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, name=rhosp17/openstack-rabbitmq, build-date=2025-11-18T22:49:50Z, io.buildah.version=1.41.4, com.redhat.component=openstack-rabbitmq-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=rabbitmq_bootstrap, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:41 np0005543225 systemd[1]: libpod-conmon-b806ce707e2530474d89117601f270791e6bb8ae060a47b5f8f5c650b40f0725.scope: Deactivated successfully. Dec 3 09:09:41 np0005543225 podman[69524]: 2025-12-03 09:09:41.651023595 +0000 UTC m=+0.691165019 container died 6af348c33cbd9266a81a2113f4f397ff9d400e2087c747c2294e85aa87f943e9 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=metrics_qdr_init_logs, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, distribution-scope=public, name=rhosp17/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-11-18T22:49:46Z, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, io.buildah.version=1.41.4, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, config_id=tripleo_step1, release=1761123044, url=https://www.redhat.com) Dec 3 09:09:41 np0005543225 podman[69698]: 2025-12-03 09:09:41.686987709 +0000 UTC m=+0.270797336 container cleanup 6af348c33cbd9266a81a2113f4f397ff9d400e2087c747c2294e85aa87f943e9 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, url=https://www.redhat.com, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, config_id=tripleo_step1, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, distribution-scope=public, com.redhat.component=openstack-qdrouterd-container, batch=17.1_20251118.1, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, tcib_managed=true, io.openshift.expose-services=, build-date=2025-11-18T22:49:46Z, container_name=metrics_qdr_init_logs, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:41 np0005543225 systemd[1]: libpod-conmon-6af348c33cbd9266a81a2113f4f397ff9d400e2087c747c2294e85aa87f943e9.scope: Deactivated successfully. Dec 3 09:09:41 np0005543225 python3[69322]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr_init_logs --conmon-pidfile /run/metrics_qdr_init_logs.pid --detach=False --label config_id=tripleo_step1 --label container_name=metrics_qdr_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 /bin/bash -c chown -R qdrouterd:qdrouterd /var/log/qdrouterd Dec 3 09:09:41 np0005543225 podman[69607]: 2025-12-03 09:09:41.727426052 +0000 UTC m=+0.484421294 container cleanup b7bf51218247b7bf9fe2235d1430468fc5e73a3791f4854cad707f63c88ccdb6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, vcs-type=git, com.redhat.component=openstack-mariadb-container, name=rhosp17/openstack-mariadb, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:51:13Z, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, tcib_managed=true, io.buildah.version=1.41.4, io.openshift.expose-services=, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_data_ownership, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:09:41 np0005543225 systemd[1]: libpod-conmon-b7bf51218247b7bf9fe2235d1430468fc5e73a3791f4854cad707f63c88ccdb6.scope: Deactivated successfully. Dec 3 09:09:41 np0005543225 python3[69322]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_data_ownership --conmon-pidfile /run/mysql_data_ownership.pid --detach=False --label config_id=tripleo_step1 --label container_name=mysql_data_ownership --label managed_by=tripleo_ansible --label config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_data_ownership.log --network host --user root --volume /var/lib/mysql:/var/lib/mysql:z registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 chown -R mysql: /var/lib/mysql Dec 3 09:09:42 np0005543225 podman[69870]: 2025-12-03 09:09:42.45515394 +0000 UTC m=+0.080218849 container create 3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, io.openshift.expose-services=, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a68876231f633b6eaee2ab03868b782b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, release=1761123044, summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, config_id=tripleo_step1, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=mysql_bootstrap, vcs-type=git, managed_by=tripleo_ansible, io.buildah.version=1.41.4, com.redhat.component=openstack-mariadb-container) Dec 3 09:09:42 np0005543225 podman[69891]: 2025-12-03 09:09:42.502062215 +0000 UTC m=+0.085831889 container create 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-11-18T22:49:46Z, vendor=Red Hat, Inc., managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, release=1761123044, container_name=metrics_qdr, name=rhosp17/openstack-qdrouterd, config_id=tripleo_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, maintainer=OpenStack TripleO Team, vcs-type=git, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f48172939798f4b816a45ed0bc7723b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}) Dec 3 09:09:42 np0005543225 systemd[1]: Started libpod-conmon-3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6.scope. Dec 3 09:09:42 np0005543225 podman[69870]: 2025-12-03 09:09:42.414661566 +0000 UTC m=+0.039726465 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:09:42 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:42 np0005543225 systemd[1]: Started libpod-conmon-60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216.scope. Dec 3 09:09:42 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/8affe22f8c7cc0f2033945186ffe14e6baf3993a65e9ed0cd35f1b2f5a0db7e8/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:42 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/8affe22f8c7cc0f2033945186ffe14e6baf3993a65e9ed0cd35f1b2f5a0db7e8/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:42 np0005543225 systemd[1]: Started libcrun container. Dec 3 09:09:42 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/4de632523dc84966c9e25e17371d3299eac65238dd2996bbf6b51fb1c76d9fb5/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:42 np0005543225 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/4de632523dc84966c9e25e17371d3299eac65238dd2996bbf6b51fb1c76d9fb5/merged/var/lib/qdrouterd supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:42 np0005543225 podman[69870]: 2025-12-03 09:09:42.551677542 +0000 UTC m=+0.176742441 container init 3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, tcib_managed=true, container_name=mysql_bootstrap, name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a68876231f633b6eaee2ab03868b782b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, io.openshift.expose-services=, url=https://www.redhat.com, com.redhat.component=openstack-mariadb-container, vendor=Red Hat, Inc., architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_step1, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, build-date=2025-11-18T22:51:13Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:42 np0005543225 podman[69891]: 2025-12-03 09:09:42.455458408 +0000 UTC m=+0.039228072 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:42 np0005543225 podman[69870]: 2025-12-03 09:09:42.566511625 +0000 UTC m=+0.191576524 container start 3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, url=https://www.redhat.com, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, vcs-type=git, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=mysql_bootstrap, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, batch=17.1_20251118.1, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a68876231f633b6eaee2ab03868b782b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb) Dec 3 09:09:42 np0005543225 podman[69870]: 2025-12-03 09:09:42.566871395 +0000 UTC m=+0.191936334 container attach 3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, build-date=2025-11-18T22:51:13Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, url=https://www.redhat.com, com.redhat.component=openstack-mariadb-container, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, config_id=tripleo_step1, release=1761123044, container_name=mysql_bootstrap, architecture=x86_64, version=17.1.12, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a68876231f633b6eaee2ab03868b782b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team) Dec 3 09:09:42 np0005543225 systemd[1]: Started /usr/bin/podman healthcheck run 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216. Dec 3 09:09:42 np0005543225 podman[69891]: 2025-12-03 09:09:42.580161157 +0000 UTC m=+0.163930831 container init 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, container_name=metrics_qdr, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f48172939798f4b816a45ed0bc7723b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., name=rhosp17/openstack-qdrouterd, batch=17.1_20251118.1, vcs-type=git, tcib_managed=true, release=1761123044, managed_by=tripleo_ansible, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, url=https://www.redhat.com, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-qdrouterd-container, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, build-date=2025-11-18T22:49:46Z, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:42 np0005543225 systemd[1]: Started /usr/bin/podman healthcheck run 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216. Dec 3 09:09:42 np0005543225 podman[69891]: 2025-12-03 09:09:42.635362581 +0000 UTC m=+0.219132255 container start 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, com.redhat.component=openstack-qdrouterd-container, build-date=2025-11-18T22:49:46Z, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-type=git, description=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, container_name=metrics_qdr, io.openshift.expose-services=, vendor=Red Hat, Inc., release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, distribution-scope=public, version=17.1.12, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f48172939798f4b816a45ed0bc7723b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, maintainer=OpenStack TripleO Team) Dec 3 09:09:42 np0005543225 python3[69322]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr --conmon-pidfile /run/metrics_qdr.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=7f48172939798f4b816a45ed0bc7723b --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=metrics_qdr --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f48172939798f4b816a45ed0bc7723b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr.log --network host --privileged=False --user qdrouterd --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro --volume /var/lib/metrics_qdr:/var/lib/qdrouterd:z --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z --volume /etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro --volume /etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:42 np0005543225 podman[69921]: 2025-12-03 09:09:42.745639738 +0000 UTC m=+0.111714695 container health_status 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=starting, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, com.redhat.component=openstack-qdrouterd-container, name=rhosp17/openstack-qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f48172939798f4b816a45ed0bc7723b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.buildah.version=1.41.4, container_name=metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, url=https://www.redhat.com, version=17.1.12, architecture=x86_64, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, build-date=2025-11-18T22:49:46Z, vendor=Red Hat, Inc., release=1761123044, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd) Dec 3 09:09:42 np0005543225 podman[69921]: 2025-12-03 09:09:42.959201734 +0000 UTC m=+0.325276671 container exec_died 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, io.openshift.expose-services=, build-date=2025-11-18T22:49:46Z, config_id=tripleo_step1, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f48172939798f4b816a45ed0bc7723b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, version=17.1.12, architecture=x86_64, managed_by=tripleo_ansible, vcs-type=git, com.redhat.component=openstack-qdrouterd-container, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=metrics_qdr, io.buildah.version=1.41.4, release=1761123044, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:42 np0005543225 systemd[1]: 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216.service: Deactivated successfully. Dec 3 09:09:48 np0005543225 systemd[1]: libpod-3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6.scope: Deactivated successfully. Dec 3 09:09:48 np0005543225 systemd[1]: libpod-3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6.scope: Consumed 2.724s CPU time. Dec 3 09:09:48 np0005543225 podman[69870]: 2025-12-03 09:09:48.596518335 +0000 UTC m=+6.221583294 container died 3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, distribution-scope=public, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a68876231f633b6eaee2ab03868b782b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., architecture=x86_64, tcib_managed=true, maintainer=OpenStack TripleO Team, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, container_name=mysql_bootstrap, description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, config_id=tripleo_step1, release=1761123044, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-mariadb-container, version=17.1.12, managed_by=tripleo_ansible, io.buildah.version=1.41.4) Dec 3 09:09:48 np0005543225 systemd[1]: tmp-crun.2RexDG.mount: Deactivated successfully. Dec 3 09:09:48 np0005543225 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:48 np0005543225 systemd[1]: var-lib-containers-storage-overlay-8affe22f8c7cc0f2033945186ffe14e6baf3993a65e9ed0cd35f1b2f5a0db7e8-merged.mount: Deactivated successfully. Dec 3 09:09:48 np0005543225 podman[70718]: 2025-12-03 09:09:48.711694191 +0000 UTC m=+0.102807619 container cleanup 3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, vendor=Red Hat, Inc., io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, name=rhosp17/openstack-mariadb, distribution-scope=public, build-date=2025-11-18T22:51:13Z, version=17.1.12, config_id=tripleo_step1, io.buildah.version=1.41.4, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a68876231f633b6eaee2ab03868b782b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.openshift.expose-services=, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=mysql_bootstrap, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, release=1761123044) Dec 3 09:09:48 np0005543225 systemd[1]: libpod-conmon-3c0b50a7cfa6e93b6182c1e19fc5a9b8f2d63c383c930524fbcfa76f1a649cd6.scope: Deactivated successfully. Dec 3 09:09:48 np0005543225 python3[69322]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_bootstrap --conmon-pidfile /run/mysql_bootstrap.pid --detach=False --env DB_MARIABACKUP_PASSWORD=dW8SB77SGTvKvQyglkYt66NDM --env DB_MARIABACKUP_USER=mariabackup --env DB_MAX_TIMEOUT=60 --env KOLLA_BOOTSTRAP=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=a68876231f633b6eaee2ab03868b782b --label config_id=tripleo_step1 --label container_name=mysql_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'a68876231f633b6eaee2ab03868b782b'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_bootstrap.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z --volume /var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z --volume /var/lib/mysql:/var/lib/mysql:rw,z --volume /etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro --volume /etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 bash -ec if [ -e /var/lib/mysql/mysql ]; then exit 0; fi#012echo -e "\n[mysqld]\nwsrep_provider=none" >> /etc/my.cnf#012export DB_ROOT_PASSWORD=$(hiera 'mysql::server::root_password')#012kolla_set_configs#012sudo -u mysql -E kolla_extend_start#012timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done'#012mysqld_safe --skip-networking --wsrep-on=OFF timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'until mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" ping 2>/dev/null; do sleep 1; done'#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "CREATE USER 'clustercheck'@'localhost' IDENTIFIED BY '$(hiera mysql_clustercheck_password)';"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "GRANT PROCESS ON *.* TO 'clustercheck'@'localhost' WITH GRANT OPTION;"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "DELETE FROM mysql.user WHERE user = 'root' AND host NOT IN ('%','localhost');"#012timeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" shutdown Dec 3 09:09:49 np0005543225 python3[70772]: ansible-file Invoked with path=/etc/systemd/system/tripleo_memcached.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:49 np0005543225 python3[70788]: ansible-file Invoked with path=/etc/systemd/system/tripleo_metrics_qdr.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:49 np0005543225 sshd[70805]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:09:49 np0005543225 python3[70804]: ansible-file Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:50 np0005543225 python3[70822]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_memcached_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:09:50 np0005543225 python3[70838]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_metrics_qdr_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:09:50 np0005543225 python3[70854]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:09:51 np0005543225 python3[70915]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752990.9152057-175118-15624738386445/source dest=/etc/systemd/system/tripleo_memcached.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:52 np0005543225 python3[70944]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752990.9152057-175118-15624738386445/source dest=/etc/systemd/system/tripleo_metrics_qdr.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:52 np0005543225 python3[70973]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752990.9152057-175118-15624738386445/source dest=/etc/systemd/system/tripleo_redis_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:53 np0005543225 python3[70989]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Dec 3 09:09:53 np0005543225 systemd[1]: Reloading. Dec 3 09:09:53 np0005543225 systemd-rc-local-generator[71011]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:53 np0005543225 systemd-sysv-generator[71016]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:53 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:54 np0005543225 python3[71041]: ansible-systemd Invoked with state=restarted name=tripleo_memcached.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:54 np0005543225 systemd[1]: Reloading. Dec 3 09:09:54 np0005543225 systemd-rc-local-generator[71067]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:54 np0005543225 systemd-sysv-generator[71072]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:54 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:54 np0005543225 systemd[1]: Starting memcached container... Dec 3 09:09:54 np0005543225 systemd[1]: Started memcached container. Dec 3 09:09:55 np0005543225 python3[71107]: ansible-systemd Invoked with state=restarted name=tripleo_metrics_qdr.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:56 np0005543225 systemd[1]: Reloading. Dec 3 09:09:56 np0005543225 systemd-rc-local-generator[71134]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:56 np0005543225 systemd-sysv-generator[71137]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:56 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:56 np0005543225 systemd[1]: Starting metrics_qdr container... Dec 3 09:09:56 np0005543225 systemd[1]: Started metrics_qdr container. Dec 3 09:09:57 np0005543225 python3[71174]: ansible-systemd Invoked with state=restarted name=tripleo_redis_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:57 np0005543225 systemd[1]: Reloading. Dec 3 09:09:57 np0005543225 systemd-rc-local-generator[71201]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:57 np0005543225 systemd-sysv-generator[71206]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:57 np0005543225 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:58 np0005543225 systemd[1]: Starting redis_tls_proxy container... Dec 3 09:09:58 np0005543225 systemd[1]: Started redis_tls_proxy container. Dec 3 09:09:58 np0005543225 python3[71253]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks1.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:10:00 np0005543225 python3[71374]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks1.json short_hostname=np0005543225 step=1 update_config_hash_only=False Dec 3 09:10:00 np0005543225 python3[71390]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:10:01 np0005543225 python3[71406]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Dec 3 09:10:09 np0005543225 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.198 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=48676 DF PROTO=TCP SPT=59086 DPT=19885 SEQ=12269975 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080AC56C32BE0000000001030307) Dec 3 09:10:09 np0005543225 sshd[71407]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:10:09 np0005543225 systemd[1]: Starting User Manager for UID 1000... Dec 3 09:10:09 np0005543225 systemd-logind[35952]: New session 18 of user zuul. Dec 3 09:10:09 np0005543225 systemd[71411]: Queued start job for default target Main User Target. Dec 3 09:10:09 np0005543225 systemd[71411]: Created slice User Application Slice. Dec 3 09:10:09 np0005543225 systemd[71411]: Started Mark boot as successful after the user session has run 2 minutes. Dec 3 09:10:09 np0005543225 systemd[71411]: Started Daily Cleanup of User's Temporary Directories. Dec 3 09:10:09 np0005543225 systemd[71411]: Reached target Paths. Dec 3 09:10:09 np0005543225 systemd[71411]: Reached target Timers. Dec 3 09:10:09 np0005543225 systemd[71411]: Starting D-Bus User Message Bus Socket... Dec 3 09:10:09 np0005543225 systemd[71411]: Starting Create User's Volatile Files and Directories... Dec 3 09:10:09 np0005543225 systemd[71411]: Finished Create User's Volatile Files and Directories. Dec 3 09:10:09 np0005543225 systemd[71411]: Listening on D-Bus User Message Bus Socket. Dec 3 09:10:09 np0005543225 systemd[71411]: Reached target Sockets. Dec 3 09:10:09 np0005543225 systemd[71411]: Reached target Basic System. Dec 3 09:10:09 np0005543225 systemd[71411]: Reached target Main User Target. Dec 3 09:10:09 np0005543225 systemd[71411]: Startup finished in 120ms. Dec 3 09:10:09 np0005543225 systemd[1]: Started User Manager for UID 1000. Dec 3 09:10:09 np0005543225 systemd[1]: Started Session 18 of User zuul. Dec 3 09:10:10 np0005543225 python3[71442]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-da4a-51e2-00000000000c-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 09:10:10 np0005543225 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.198 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=48677 DF PROTO=TCP SPT=59086 DPT=19885 SEQ=12269975 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080AC56C36C30000000001030307) Dec 3 09:10:10 np0005543225 subscription-manager[71443]: Unregistered machine with identity: b5a7ebaa-1284-424e-a0bf-3870d2bab3b3 Dec 3 09:10:12 np0005543225 systemd[1]: Started /usr/bin/podman healthcheck run 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2. Dec 3 09:10:12 np0005543225 podman[71445]: 2025-12-03 09:10:12.331056819 +0000 UTC m=+0.092359162 container health_status 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, maintainer=OpenStack TripleO Team, vcs-type=git, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 memcached, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 memcached, batch=17.1_20251118.1, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, io.buildah.version=1.41.4, build-date=2025-11-18T22:49:49Z, version=17.1.12, name=rhosp17/openstack-memcached, com.redhat.component=openstack-memcached-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=memcached, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_step1, distribution-scope=public, architecture=x86_64, io.openshift.expose-services=) Dec 3 09:10:12 np0005543225 podman[71445]: 2025-12-03 09:10:12.381209819 +0000 UTC m=+0.142512102 container exec_died 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, release=1761123044, vendor=Red Hat, Inc., tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.buildah.version=1.41.4, build-date=2025-11-18T22:49:49Z, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, config_id=tripleo_step1, io.openshift.expose-services=, name=rhosp17/openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, com.redhat.component=openstack-memcached-container, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7cabf7af6dffa9451de7685929b15d94'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, summary=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=memcached) Dec 3 09:10:12 np0005543225 systemd[1]: 97620119ba0309f656ab0c8cb116dc352630020b627fee82515ed1688411a6a2.service: Deactivated successfully. Dec 3 09:10:12 np0005543225 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:83:be:22 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.198 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=48678 DF PROTO=TCP SPT=59086 DPT=19885 SEQ=12269975 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080AC56C3EC30000000001030307) Dec 3 09:10:13 np0005543225 systemd[1]: Started /usr/bin/podman healthcheck run 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216. Dec 3 09:10:13 np0005543225 systemd[1]: tmp-crun.GQwRC8.mount: Deactivated successfully. Dec 3 09:10:13 np0005543225 podman[71468]: 2025-12-03 09:10:13.320317056 +0000 UTC m=+0.086562048 container health_status 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, build-date=2025-11-18T22:49:46Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f48172939798f4b816a45ed0bc7723b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, container_name=metrics_qdr, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, architecture=x86_64, config_id=tripleo_step1, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, io.buildah.version=1.41.4, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:10:13 np0005543225 podman[71468]: 2025-12-03 09:10:13.52474206 +0000 UTC m=+0.290987022 container exec_died 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, io.buildah.version=1.41.4, url=https://www.redhat.com, vcs-type=git, name=rhosp17/openstack-qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, architecture=x86_64, distribution-scope=public, config_id=tripleo_step1, container_name=metrics_qdr, tcib_managed=true, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '7f48172939798f4b816a45ed0bc7723b'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:49:46Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Dec 3 09:10:13 np0005543225 systemd[1]: 60b03bd0b1808c5f4cb9e086ce059153effd3d7bcfb9cd94976187dad605f216.service: Deactivated successfully. Dec 3 09:10:16 np0005543225 systemd[1]: session-18.scope: Deactivated successfully. Dec 3 09:10:16 np0005543225 systemd-logind[35952]: Session 18 logged out. Waiting for processes to exit. Dec 3 09:10:16 np0005543225 systemd-logind[35952]: Removed session 18. Dec 3 09:10:18 np0005543225 sshd[71498]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:10:23 np0005543225 sshd[71500]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:10:26 np0005543225 systemd[1]: Stopping User Manager for UID 1000... Dec 3 09:10:26 np0005543225 systemd[71411]: Activating special unit Exit the Session... Dec 3 09:10:26 np0005543225 systemd[71411]: Stopped target Main User Target. Dec 3 09:10:26 np0005543225 systemd[71411]: Stopped target Basic System. Dec 3 09:10:26 np0005543225 systemd[71411]: Stopped target Paths. Dec 3 09:10:26 np0005543225 systemd[71411]: Stopped target Sockets. Dec 3 09:10:26 np0005543225 systemd[71411]: Stopped target Timers. Dec 3 09:10:26 np0005543225 systemd[71411]: Stopped Mark boot as successful after the user session has run 2 minutes. Dec 3 09:10:26 np0005543225 systemd[71411]: Stopped Daily Cleanup of User's Temporary Directories. Dec 3 09:10:26 np0005543225 systemd[71411]: Closed D-Bus User Message Bus Socket. Dec 3 09:10:26 np0005543225 systemd[71411]: Stopped Create User's Volatile Files and Directories. Dec 3 09:10:26 np0005543225 systemd[71411]: Removed slice User Application Slice. Dec 3 09:10:26 np0005543225 systemd[71411]: Reached target Shutdown. Dec 3 09:10:26 np0005543225 systemd[71411]: Finished Exit the Session. Dec 3 09:10:26 np0005543225 systemd[71411]: Reached target Exit the Session. Dec 3 09:10:26 np0005543225 systemd[1]: user@1000.service: Deactivated successfully. Dec 3 09:10:26 np0005543225 systemd[1]: Stopped User Manager for UID 1000. Dec 3 09:10:27 np0005543225 sshd[71502]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:10:27 np0005543225 systemd[1]: Starting User Manager for UID 1000... Dec 3 09:10:27 np0005543225 systemd-logind[35952]: New session 20 of user zuul. Dec 3 09:10:27 np0005543225 systemd[71506]: Queued start job for default target Main User Target.