Dec 3 01:41:15 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Dec 3 01:41:15 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Dec 3 01:41:15 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Dec 3 01:41:15 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 3 01:41:15 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 3 01:41:15 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 3 01:41:15 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 3 01:41:15 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 3 01:41:15 localhost kernel: signal: max sigframe size: 1776 Dec 3 01:41:15 localhost kernel: BIOS-provided physical RAM map: Dec 3 01:41:15 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 3 01:41:15 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 3 01:41:15 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 3 01:41:15 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Dec 3 01:41:15 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Dec 3 01:41:15 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 3 01:41:15 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 3 01:41:15 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Dec 3 01:41:15 localhost kernel: NX (Execute Disable) protection: active Dec 3 01:41:15 localhost kernel: SMBIOS 2.8 present. Dec 3 01:41:15 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 3 01:41:15 localhost kernel: Hypervisor detected: KVM Dec 3 01:41:15 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 3 01:41:15 localhost kernel: kvm-clock: using sched offset of 1923767747 cycles Dec 3 01:41:15 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 3 01:41:15 localhost kernel: tsc: Detected 2799.998 MHz processor Dec 3 01:41:15 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Dec 3 01:41:15 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 3 01:41:15 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Dec 3 01:41:15 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Dec 3 01:41:15 localhost kernel: Using GB pages for direct mapping Dec 3 01:41:15 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Dec 3 01:41:15 localhost kernel: ACPI: Early table checksum verification disabled Dec 3 01:41:15 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Dec 3 01:41:15 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:15 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:15 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:15 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Dec 3 01:41:15 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:15 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 3 01:41:15 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Dec 3 01:41:15 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Dec 3 01:41:15 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Dec 3 01:41:15 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Dec 3 01:41:15 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Dec 3 01:41:15 localhost kernel: No NUMA configuration found Dec 3 01:41:15 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Dec 3 01:41:15 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd5000-0x43fffffff] Dec 3 01:41:15 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Dec 3 01:41:15 localhost kernel: Zone ranges: Dec 3 01:41:15 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 3 01:41:15 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 3 01:41:15 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Dec 3 01:41:15 localhost kernel: Device empty Dec 3 01:41:15 localhost kernel: Movable zone start for each node Dec 3 01:41:15 localhost kernel: Early memory node ranges Dec 3 01:41:15 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 3 01:41:15 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Dec 3 01:41:15 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Dec 3 01:41:15 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Dec 3 01:41:15 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 3 01:41:15 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 3 01:41:15 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Dec 3 01:41:15 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Dec 3 01:41:15 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 3 01:41:15 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 3 01:41:15 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 3 01:41:15 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 3 01:41:15 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 3 01:41:15 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 3 01:41:15 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 3 01:41:15 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 3 01:41:15 localhost kernel: TSC deadline timer available Dec 3 01:41:15 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Dec 3 01:41:15 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Dec 3 01:41:15 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Dec 3 01:41:15 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Dec 3 01:41:15 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Dec 3 01:41:15 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Dec 3 01:41:15 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Dec 3 01:41:15 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Dec 3 01:41:15 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Dec 3 01:41:15 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Dec 3 01:41:15 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Dec 3 01:41:15 localhost kernel: Booting paravirtualized kernel on KVM Dec 3 01:41:15 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 3 01:41:15 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Dec 3 01:41:15 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Dec 3 01:41:15 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Dec 3 01:41:15 localhost kernel: Fallback order for Node 0: 0 Dec 3 01:41:15 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Dec 3 01:41:15 localhost kernel: Policy zone: Normal Dec 3 01:41:15 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Dec 3 01:41:15 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Dec 3 01:41:15 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 3 01:41:15 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 3 01:41:15 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 3 01:41:15 localhost kernel: software IO TLB: area num 8. Dec 3 01:41:15 localhost kernel: Memory: 2873456K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741260K reserved, 0K cma-reserved) Dec 3 01:41:15 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Dec 3 01:41:15 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Dec 3 01:41:15 localhost kernel: ftrace: allocating 44803 entries in 176 pages Dec 3 01:41:15 localhost kernel: ftrace: allocated 176 pages with 3 groups Dec 3 01:41:15 localhost kernel: Dynamic Preempt: voluntary Dec 3 01:41:15 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Dec 3 01:41:15 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Dec 3 01:41:15 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Dec 3 01:41:15 localhost kernel: #011Rude variant of Tasks RCU enabled. Dec 3 01:41:15 localhost kernel: #011Tracing variant of Tasks RCU enabled. Dec 3 01:41:15 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 3 01:41:15 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Dec 3 01:41:15 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Dec 3 01:41:15 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Dec 3 01:41:15 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Dec 3 01:41:15 localhost kernel: random: crng init done (trusting CPU's manufacturer) Dec 3 01:41:15 localhost kernel: Console: colour VGA+ 80x25 Dec 3 01:41:15 localhost kernel: printk: console [tty0] enabled Dec 3 01:41:15 localhost kernel: printk: console [ttyS0] enabled Dec 3 01:41:15 localhost kernel: ACPI: Core revision 20211217 Dec 3 01:41:15 localhost kernel: APIC: Switch to symmetric I/O mode setup Dec 3 01:41:15 localhost kernel: x2apic enabled Dec 3 01:41:15 localhost kernel: Switched APIC routing to physical x2apic. Dec 3 01:41:15 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 3 01:41:15 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Dec 3 01:41:15 localhost kernel: pid_max: default: 32768 minimum: 301 Dec 3 01:41:15 localhost kernel: LSM: Security Framework initializing Dec 3 01:41:15 localhost kernel: Yama: becoming mindful. Dec 3 01:41:15 localhost kernel: SELinux: Initializing. Dec 3 01:41:15 localhost kernel: LSM support for eBPF active Dec 3 01:41:15 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 3 01:41:15 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 3 01:41:15 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 3 01:41:15 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 3 01:41:15 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 3 01:41:15 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 3 01:41:15 localhost kernel: Spectre V2 : Mitigation: Retpolines Dec 3 01:41:15 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 3 01:41:15 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 3 01:41:15 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 3 01:41:15 localhost kernel: RETBleed: Mitigation: untrained return thunk Dec 3 01:41:15 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 3 01:41:15 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Dec 3 01:41:15 localhost kernel: Freeing SMP alternatives memory: 36K Dec 3 01:41:15 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 3 01:41:15 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Dec 3 01:41:15 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Dec 3 01:41:15 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Dec 3 01:41:15 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Dec 3 01:41:15 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 3 01:41:15 localhost kernel: ... version: 0 Dec 3 01:41:15 localhost kernel: ... bit width: 48 Dec 3 01:41:15 localhost kernel: ... generic registers: 6 Dec 3 01:41:15 localhost kernel: ... value mask: 0000ffffffffffff Dec 3 01:41:15 localhost kernel: ... max period: 00007fffffffffff Dec 3 01:41:15 localhost kernel: ... fixed-purpose events: 0 Dec 3 01:41:15 localhost kernel: ... event mask: 000000000000003f Dec 3 01:41:15 localhost kernel: rcu: Hierarchical SRCU implementation. Dec 3 01:41:15 localhost kernel: rcu: #011Max phase no-delay instances is 400. Dec 3 01:41:15 localhost kernel: smp: Bringing up secondary CPUs ... Dec 3 01:41:15 localhost kernel: x86: Booting SMP configuration: Dec 3 01:41:15 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Dec 3 01:41:15 localhost kernel: smp: Brought up 1 node, 8 CPUs Dec 3 01:41:15 localhost kernel: smpboot: Max logical packages: 8 Dec 3 01:41:15 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Dec 3 01:41:15 localhost kernel: node 0 deferred pages initialised in 20ms Dec 3 01:41:15 localhost kernel: devtmpfs: initialized Dec 3 01:41:15 localhost kernel: x86/mm: Memory block size: 128MB Dec 3 01:41:15 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 3 01:41:15 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Dec 3 01:41:15 localhost kernel: pinctrl core: initialized pinctrl subsystem Dec 3 01:41:15 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 3 01:41:15 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Dec 3 01:41:15 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 3 01:41:15 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 3 01:41:15 localhost kernel: audit: initializing netlink subsys (disabled) Dec 3 01:41:15 localhost kernel: audit: type=2000 audit(1764744073.579:1): state=initialized audit_enabled=0 res=1 Dec 3 01:41:15 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Dec 3 01:41:15 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 3 01:41:15 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Dec 3 01:41:15 localhost kernel: cpuidle: using governor menu Dec 3 01:41:15 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Dec 3 01:41:15 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 3 01:41:15 localhost kernel: PCI: Using configuration type 1 for base access Dec 3 01:41:15 localhost kernel: PCI: Using configuration type 1 for extended access Dec 3 01:41:15 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 3 01:41:15 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Dec 3 01:41:15 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 3 01:41:15 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 3 01:41:15 localhost kernel: cryptd: max_cpu_qlen set to 1000 Dec 3 01:41:15 localhost kernel: ACPI: Added _OSI(Module Device) Dec 3 01:41:15 localhost kernel: ACPI: Added _OSI(Processor Device) Dec 3 01:41:15 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 3 01:41:15 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 3 01:41:15 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 3 01:41:15 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 3 01:41:15 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 3 01:41:15 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 3 01:41:15 localhost kernel: ACPI: Interpreter enabled Dec 3 01:41:15 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Dec 3 01:41:15 localhost kernel: ACPI: Using IOAPIC for interrupt routing Dec 3 01:41:15 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 3 01:41:15 localhost kernel: PCI: Using E820 reservations for host bridge windows Dec 3 01:41:15 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 3 01:41:15 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 3 01:41:15 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Dec 3 01:41:15 localhost kernel: acpiphp: Slot [3] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [4] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [5] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [6] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [7] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [8] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [9] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [10] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [11] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [12] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [13] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [14] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [15] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [16] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [17] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [18] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [19] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [20] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [21] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [22] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [23] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [24] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [25] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [26] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [27] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [28] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [29] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [30] registered Dec 3 01:41:15 localhost kernel: acpiphp: Slot [31] registered Dec 3 01:41:15 localhost kernel: PCI host bridge to bus 0000:00 Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 3 01:41:15 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 3 01:41:15 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 3 01:41:15 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 3 01:41:15 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Dec 3 01:41:15 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 3 01:41:15 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 3 01:41:15 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 3 01:41:15 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 3 01:41:15 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Dec 3 01:41:15 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Dec 3 01:41:15 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 3 01:41:15 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 3 01:41:15 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 3 01:41:15 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 3 01:41:15 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 3 01:41:15 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 3 01:41:15 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 3 01:41:15 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 3 01:41:15 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 3 01:41:15 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 3 01:41:15 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 3 01:41:15 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 3 01:41:15 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 3 01:41:15 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 3 01:41:15 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 3 01:41:15 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 3 01:41:15 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 3 01:41:15 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 3 01:41:15 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 3 01:41:15 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 3 01:41:15 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 3 01:41:15 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 3 01:41:15 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Dec 3 01:41:15 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 3 01:41:15 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 3 01:41:15 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 3 01:41:15 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 3 01:41:15 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 3 01:41:15 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 3 01:41:15 localhost kernel: iommu: Default domain type: Translated Dec 3 01:41:15 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 3 01:41:15 localhost kernel: SCSI subsystem initialized Dec 3 01:41:15 localhost kernel: ACPI: bus type USB registered Dec 3 01:41:15 localhost kernel: usbcore: registered new interface driver usbfs Dec 3 01:41:15 localhost kernel: usbcore: registered new interface driver hub Dec 3 01:41:15 localhost kernel: usbcore: registered new device driver usb Dec 3 01:41:15 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Dec 3 01:41:15 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 3 01:41:15 localhost kernel: PTP clock support registered Dec 3 01:41:15 localhost kernel: EDAC MC: Ver: 3.0.0 Dec 3 01:41:15 localhost kernel: NetLabel: Initializing Dec 3 01:41:15 localhost kernel: NetLabel: domain hash size = 128 Dec 3 01:41:15 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Dec 3 01:41:15 localhost kernel: NetLabel: unlabeled traffic allowed by default Dec 3 01:41:15 localhost kernel: PCI: Using ACPI for IRQ routing Dec 3 01:41:15 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 3 01:41:15 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 3 01:41:15 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 3 01:41:15 localhost kernel: vgaarb: loaded Dec 3 01:41:15 localhost kernel: clocksource: Switched to clocksource kvm-clock Dec 3 01:41:15 localhost kernel: VFS: Disk quotas dquot_6.6.0 Dec 3 01:41:15 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 3 01:41:15 localhost kernel: pnp: PnP ACPI init Dec 3 01:41:15 localhost kernel: pnp: PnP ACPI: found 5 devices Dec 3 01:41:15 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 3 01:41:15 localhost kernel: NET: Registered PF_INET protocol family Dec 3 01:41:15 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 3 01:41:15 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Dec 3 01:41:15 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 3 01:41:15 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 3 01:41:15 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 3 01:41:15 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Dec 3 01:41:15 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Dec 3 01:41:15 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Dec 3 01:41:15 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Dec 3 01:41:15 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 3 01:41:15 localhost kernel: NET: Registered PF_XDP protocol family Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Dec 3 01:41:15 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Dec 3 01:41:15 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 3 01:41:15 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 3 01:41:15 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 3 01:41:15 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 27157 usecs Dec 3 01:41:15 localhost kernel: PCI: CLS 0 bytes, default 64 Dec 3 01:41:15 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 3 01:41:15 localhost kernel: Trying to unpack rootfs image as initramfs... Dec 3 01:41:15 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Dec 3 01:41:15 localhost kernel: ACPI: bus type thunderbolt registered Dec 3 01:41:15 localhost kernel: Initialise system trusted keyrings Dec 3 01:41:15 localhost kernel: Key type blacklist registered Dec 3 01:41:15 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Dec 3 01:41:15 localhost kernel: zbud: loaded Dec 3 01:41:15 localhost kernel: integrity: Platform Keyring initialized Dec 3 01:41:15 localhost kernel: NET: Registered PF_ALG protocol family Dec 3 01:41:15 localhost kernel: xor: automatically using best checksumming function avx Dec 3 01:41:15 localhost kernel: Key type asymmetric registered Dec 3 01:41:15 localhost kernel: Asymmetric key parser 'x509' registered Dec 3 01:41:15 localhost kernel: Running certificate verification selftests Dec 3 01:41:15 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Dec 3 01:41:15 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Dec 3 01:41:15 localhost kernel: io scheduler mq-deadline registered Dec 3 01:41:15 localhost kernel: io scheduler kyber registered Dec 3 01:41:15 localhost kernel: io scheduler bfq registered Dec 3 01:41:15 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Dec 3 01:41:15 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Dec 3 01:41:15 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Dec 3 01:41:15 localhost kernel: ACPI: button: Power Button [PWRF] Dec 3 01:41:15 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 3 01:41:15 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 3 01:41:15 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 3 01:41:15 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 3 01:41:15 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 3 01:41:15 localhost kernel: Non-volatile memory driver v1.3 Dec 3 01:41:15 localhost kernel: rdac: device handler registered Dec 3 01:41:15 localhost kernel: hp_sw: device handler registered Dec 3 01:41:15 localhost kernel: emc: device handler registered Dec 3 01:41:15 localhost kernel: alua: device handler registered Dec 3 01:41:15 localhost kernel: libphy: Fixed MDIO Bus: probed Dec 3 01:41:15 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Dec 3 01:41:15 localhost kernel: ehci-pci: EHCI PCI platform driver Dec 3 01:41:15 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Dec 3 01:41:15 localhost kernel: ohci-pci: OHCI PCI platform driver Dec 3 01:41:15 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Dec 3 01:41:15 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Dec 3 01:41:15 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Dec 3 01:41:15 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Dec 3 01:41:15 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Dec 3 01:41:15 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Dec 3 01:41:15 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Dec 3 01:41:15 localhost kernel: usb usb1: Product: UHCI Host Controller Dec 3 01:41:15 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Dec 3 01:41:15 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Dec 3 01:41:15 localhost kernel: hub 1-0:1.0: USB hub found Dec 3 01:41:15 localhost kernel: hub 1-0:1.0: 2 ports detected Dec 3 01:41:15 localhost kernel: usbcore: registered new interface driver usbserial_generic Dec 3 01:41:15 localhost kernel: usbserial: USB Serial support registered for generic Dec 3 01:41:15 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 3 01:41:15 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 3 01:41:15 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 3 01:41:15 localhost kernel: mousedev: PS/2 mouse device common for all mice Dec 3 01:41:15 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 3 01:41:15 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Dec 3 01:41:15 localhost kernel: rtc_cmos 00:04: registered as rtc0 Dec 3 01:41:15 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-12-03T06:41:14 UTC (1764744074) Dec 3 01:41:15 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 3 01:41:15 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Dec 3 01:41:15 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Dec 3 01:41:15 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Dec 3 01:41:15 localhost kernel: usbcore: registered new interface driver usbhid Dec 3 01:41:15 localhost kernel: usbhid: USB HID core driver Dec 3 01:41:15 localhost kernel: drop_monitor: Initializing network drop monitor service Dec 3 01:41:15 localhost kernel: Initializing XFRM netlink socket Dec 3 01:41:15 localhost kernel: NET: Registered PF_INET6 protocol family Dec 3 01:41:15 localhost kernel: Segment Routing with IPv6 Dec 3 01:41:15 localhost kernel: NET: Registered PF_PACKET protocol family Dec 3 01:41:15 localhost kernel: mpls_gso: MPLS GSO support Dec 3 01:41:15 localhost kernel: IPI shorthand broadcast: enabled Dec 3 01:41:15 localhost kernel: AVX2 version of gcm_enc/dec engaged. Dec 3 01:41:15 localhost kernel: AES CTR mode by8 optimization enabled Dec 3 01:41:15 localhost kernel: sched_clock: Marking stable (778225196, 181127335)->(1082114666, -122762135) Dec 3 01:41:15 localhost kernel: registered taskstats version 1 Dec 3 01:41:15 localhost kernel: Loading compiled-in X.509 certificates Dec 3 01:41:15 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Dec 3 01:41:15 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Dec 3 01:41:15 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Dec 3 01:41:15 localhost kernel: zswap: loaded using pool lzo/zbud Dec 3 01:41:15 localhost kernel: page_owner is disabled Dec 3 01:41:15 localhost kernel: Key type big_key registered Dec 3 01:41:15 localhost kernel: Freeing initrd memory: 74232K Dec 3 01:41:15 localhost kernel: Key type encrypted registered Dec 3 01:41:15 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Dec 3 01:41:15 localhost kernel: Loading compiled-in module X.509 certificates Dec 3 01:41:15 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Dec 3 01:41:15 localhost kernel: ima: Allocated hash algorithm: sha256 Dec 3 01:41:15 localhost kernel: ima: No architecture policies found Dec 3 01:41:15 localhost kernel: evm: Initialising EVM extended attributes: Dec 3 01:41:15 localhost kernel: evm: security.selinux Dec 3 01:41:15 localhost kernel: evm: security.SMACK64 (disabled) Dec 3 01:41:15 localhost kernel: evm: security.SMACK64EXEC (disabled) Dec 3 01:41:15 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Dec 3 01:41:15 localhost kernel: evm: security.SMACK64MMAP (disabled) Dec 3 01:41:15 localhost kernel: evm: security.apparmor (disabled) Dec 3 01:41:15 localhost kernel: evm: security.ima Dec 3 01:41:15 localhost kernel: evm: security.capability Dec 3 01:41:15 localhost kernel: evm: HMAC attrs: 0x1 Dec 3 01:41:15 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Dec 3 01:41:15 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Dec 3 01:41:15 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Dec 3 01:41:15 localhost kernel: usb 1-1: Product: QEMU USB Tablet Dec 3 01:41:15 localhost kernel: usb 1-1: Manufacturer: QEMU Dec 3 01:41:15 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Dec 3 01:41:15 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Dec 3 01:41:15 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Dec 3 01:41:15 localhost kernel: Freeing unused decrypted memory: 2036K Dec 3 01:41:15 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Dec 3 01:41:15 localhost kernel: Write protecting the kernel read-only data: 26624k Dec 3 01:41:15 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 3 01:41:15 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Dec 3 01:41:15 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Dec 3 01:41:15 localhost kernel: Run /init as init process Dec 3 01:41:15 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 3 01:41:15 localhost systemd[1]: Detected virtualization kvm. Dec 3 01:41:15 localhost systemd[1]: Detected architecture x86-64. Dec 3 01:41:15 localhost systemd[1]: Running in initrd. Dec 3 01:41:15 localhost systemd[1]: No hostname configured, using default hostname. Dec 3 01:41:15 localhost systemd[1]: Hostname set to . Dec 3 01:41:15 localhost systemd[1]: Initializing machine ID from VM UUID. Dec 3 01:41:15 localhost systemd[1]: Queued start job for default target Initrd Default Target. Dec 3 01:41:15 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 3 01:41:15 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 3 01:41:15 localhost systemd[1]: Reached target Initrd /usr File System. Dec 3 01:41:15 localhost systemd[1]: Reached target Local File Systems. Dec 3 01:41:15 localhost systemd[1]: Reached target Path Units. Dec 3 01:41:15 localhost systemd[1]: Reached target Slice Units. Dec 3 01:41:15 localhost systemd[1]: Reached target Swaps. Dec 3 01:41:15 localhost systemd[1]: Reached target Timer Units. Dec 3 01:41:15 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 3 01:41:15 localhost systemd[1]: Listening on Journal Socket (/dev/log). Dec 3 01:41:15 localhost systemd[1]: Listening on Journal Socket. Dec 3 01:41:15 localhost systemd[1]: Listening on udev Control Socket. Dec 3 01:41:15 localhost systemd[1]: Listening on udev Kernel Socket. Dec 3 01:41:15 localhost systemd[1]: Reached target Socket Units. Dec 3 01:41:15 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 3 01:41:15 localhost systemd[1]: Starting Journal Service... Dec 3 01:41:15 localhost systemd[1]: Starting Load Kernel Modules... Dec 3 01:41:15 localhost systemd[1]: Starting Create System Users... Dec 3 01:41:15 localhost systemd[1]: Starting Setup Virtual Console... Dec 3 01:41:15 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 3 01:41:15 localhost systemd[1]: Finished Load Kernel Modules. Dec 3 01:41:15 localhost systemd-journald[283]: Journal started Dec 3 01:41:15 localhost systemd-journald[283]: Runtime Journal (/run/log/journal/9cfa6a6154a4444f8b25fad7a498881b) is 8.0M, max 314.7M, 306.7M free. Dec 3 01:41:15 localhost systemd-modules-load[284]: Module 'msr' is built in Dec 3 01:41:15 localhost systemd[1]: Started Journal Service. Dec 3 01:41:15 localhost systemd[1]: Finished Setup Virtual Console. Dec 3 01:41:15 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Dec 3 01:41:15 localhost systemd[1]: Starting dracut cmdline hook... Dec 3 01:41:15 localhost systemd[1]: Starting Apply Kernel Variables... Dec 3 01:41:15 localhost systemd-sysusers[285]: Creating group 'sgx' with GID 997. Dec 3 01:41:15 localhost systemd-sysusers[285]: Creating group 'users' with GID 100. Dec 3 01:41:15 localhost systemd-sysusers[285]: Creating group 'dbus' with GID 81. Dec 3 01:41:15 localhost systemd[1]: Finished Apply Kernel Variables. Dec 3 01:41:15 localhost systemd-sysusers[285]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Dec 3 01:41:15 localhost systemd[1]: Finished Create System Users. Dec 3 01:41:15 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 3 01:41:15 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 3 01:41:15 localhost dracut-cmdline[289]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Dec 3 01:41:15 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 3 01:41:15 localhost dracut-cmdline[289]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Dec 3 01:41:15 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 3 01:41:15 localhost systemd[1]: Finished dracut cmdline hook. Dec 3 01:41:15 localhost systemd[1]: Starting dracut pre-udev hook... Dec 3 01:41:15 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 3 01:41:15 localhost kernel: device-mapper: uevent: version 1.0.3 Dec 3 01:41:15 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Dec 3 01:41:15 localhost kernel: RPC: Registered named UNIX socket transport module. Dec 3 01:41:15 localhost kernel: RPC: Registered udp transport module. Dec 3 01:41:15 localhost kernel: RPC: Registered tcp transport module. Dec 3 01:41:15 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 3 01:41:15 localhost rpc.statd[408]: Version 2.5.4 starting Dec 3 01:41:15 localhost rpc.statd[408]: Initializing NSM state Dec 3 01:41:15 localhost rpc.idmapd[413]: Setting log level to 0 Dec 3 01:41:15 localhost systemd[1]: Finished dracut pre-udev hook. Dec 3 01:41:15 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 3 01:41:15 localhost systemd-udevd[426]: Using default interface naming scheme 'rhel-9.0'. Dec 3 01:41:15 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 3 01:41:15 localhost systemd[1]: Starting dracut pre-trigger hook... Dec 3 01:41:15 localhost systemd[1]: Finished dracut pre-trigger hook. Dec 3 01:41:15 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 3 01:41:15 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 3 01:41:15 localhost systemd[1]: Reached target System Initialization. Dec 3 01:41:15 localhost systemd[1]: Reached target Basic System. Dec 3 01:41:15 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 3 01:41:15 localhost systemd[1]: Reached target Network. Dec 3 01:41:15 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Dec 3 01:41:15 localhost systemd[1]: Starting dracut initqueue hook... Dec 3 01:41:15 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Dec 3 01:41:15 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 3 01:41:15 localhost kernel: GPT:20971519 != 838860799 Dec 3 01:41:15 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Dec 3 01:41:15 localhost kernel: GPT:20971519 != 838860799 Dec 3 01:41:15 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Dec 3 01:41:15 localhost kernel: vda: vda1 vda2 vda3 vda4 Dec 3 01:41:15 localhost kernel: scsi host0: ata_piix Dec 3 01:41:16 localhost systemd-udevd[443]: Network interface NamePolicy= disabled on kernel command line. Dec 3 01:41:16 localhost kernel: scsi host1: ata_piix Dec 3 01:41:16 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Dec 3 01:41:16 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Dec 3 01:41:16 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Dec 3 01:41:16 localhost systemd[1]: Reached target Initrd Root Device. Dec 3 01:41:16 localhost kernel: ata1: found unknown device (class 0) Dec 3 01:41:16 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 3 01:41:16 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 3 01:41:16 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Dec 3 01:41:16 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 3 01:41:16 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 3 01:41:16 localhost systemd[1]: Finished dracut initqueue hook. Dec 3 01:41:16 localhost systemd[1]: Reached target Preparation for Remote File Systems. Dec 3 01:41:16 localhost systemd[1]: Reached target Remote Encrypted Volumes. Dec 3 01:41:16 localhost systemd[1]: Reached target Remote File Systems. Dec 3 01:41:16 localhost systemd[1]: Starting dracut pre-mount hook... Dec 3 01:41:16 localhost systemd[1]: Finished dracut pre-mount hook. Dec 3 01:41:16 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Dec 3 01:41:16 localhost systemd-fsck[513]: /usr/sbin/fsck.xfs: XFS file system. Dec 3 01:41:16 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Dec 3 01:41:16 localhost systemd[1]: Mounting /sysroot... Dec 3 01:41:16 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Dec 3 01:41:16 localhost kernel: XFS (vda4): Mounting V5 Filesystem Dec 3 01:41:16 localhost kernel: XFS (vda4): Ending clean mount Dec 3 01:41:16 localhost systemd[1]: Mounted /sysroot. Dec 3 01:41:16 localhost systemd[1]: Reached target Initrd Root File System. Dec 3 01:41:16 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Dec 3 01:41:16 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Dec 3 01:41:16 localhost systemd[1]: Reached target Initrd File Systems. Dec 3 01:41:16 localhost systemd[1]: Reached target Initrd Default Target. Dec 3 01:41:16 localhost systemd[1]: Starting dracut mount hook... Dec 3 01:41:16 localhost systemd[1]: Finished dracut mount hook. Dec 3 01:41:16 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Dec 3 01:41:16 localhost rpc.idmapd[413]: exiting on signal 15 Dec 3 01:41:16 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Dec 3 01:41:16 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Dec 3 01:41:16 localhost systemd[1]: Stopped target Network. Dec 3 01:41:16 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Dec 3 01:41:16 localhost systemd[1]: Stopped target Timer Units. Dec 3 01:41:16 localhost systemd[1]: dbus.socket: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Dec 3 01:41:16 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Dec 3 01:41:16 localhost systemd[1]: Stopped target Initrd Default Target. Dec 3 01:41:16 localhost systemd[1]: Stopped target Basic System. Dec 3 01:41:16 localhost systemd[1]: Stopped target Initrd Root Device. Dec 3 01:41:16 localhost systemd[1]: Stopped target Initrd /usr File System. Dec 3 01:41:16 localhost systemd[1]: Stopped target Path Units. Dec 3 01:41:16 localhost systemd[1]: Stopped target Remote File Systems. Dec 3 01:41:16 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Dec 3 01:41:16 localhost systemd[1]: Stopped target Slice Units. Dec 3 01:41:16 localhost systemd[1]: Stopped target Socket Units. Dec 3 01:41:16 localhost systemd[1]: Stopped target System Initialization. Dec 3 01:41:16 localhost systemd[1]: Stopped target Local File Systems. Dec 3 01:41:16 localhost systemd[1]: Stopped target Swaps. Dec 3 01:41:16 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped dracut mount hook. Dec 3 01:41:16 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped dracut pre-mount hook. Dec 3 01:41:16 localhost systemd[1]: Stopped target Local Encrypted Volumes. Dec 3 01:41:16 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Dec 3 01:41:16 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped dracut initqueue hook. Dec 3 01:41:16 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Apply Kernel Variables. Dec 3 01:41:16 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Load Kernel Modules. Dec 3 01:41:16 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Create Volatile Files and Directories. Dec 3 01:41:16 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Coldplug All udev Devices. Dec 3 01:41:16 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped dracut pre-trigger hook. Dec 3 01:41:16 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Dec 3 01:41:16 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Setup Virtual Console. Dec 3 01:41:16 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Dec 3 01:41:16 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Dec 3 01:41:16 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Closed udev Control Socket. Dec 3 01:41:16 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Closed udev Kernel Socket. Dec 3 01:41:16 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped dracut pre-udev hook. Dec 3 01:41:16 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped dracut cmdline hook. Dec 3 01:41:16 localhost systemd[1]: Starting Cleanup udev Database... Dec 3 01:41:16 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Dec 3 01:41:16 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Create List of Static Device Nodes. Dec 3 01:41:16 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Stopped Create System Users. Dec 3 01:41:16 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 3 01:41:16 localhost systemd[1]: Finished Cleanup udev Database. Dec 3 01:41:16 localhost systemd[1]: Reached target Switch Root. Dec 3 01:41:17 localhost systemd[1]: Starting Switch Root... Dec 3 01:41:17 localhost systemd[1]: Switching root. Dec 3 01:41:17 localhost systemd-journald[283]: Received SIGTERM from PID 1 (systemd). Dec 3 01:41:17 localhost systemd-journald[283]: Journal stopped Dec 3 01:41:17 localhost kernel: audit: type=1404 audit(1764744077.091:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Dec 3 01:41:17 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 01:41:17 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 01:41:17 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 01:41:17 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 01:41:17 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 01:41:17 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 01:41:17 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 01:41:17 localhost kernel: audit: type=1403 audit(1764744077.181:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 3 01:41:17 localhost systemd[1]: Successfully loaded SELinux policy in 93.283ms. Dec 3 01:41:17 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 29.857ms. Dec 3 01:41:17 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 3 01:41:17 localhost systemd[1]: Detected virtualization kvm. Dec 3 01:41:17 localhost systemd[1]: Detected architecture x86-64. Dec 3 01:41:17 localhost systemd-rc-local-generator[583]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 01:41:17 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 01:41:17 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 3 01:41:17 localhost systemd[1]: Stopped Switch Root. Dec 3 01:41:17 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 3 01:41:17 localhost systemd[1]: Created slice Slice /system/getty. Dec 3 01:41:17 localhost systemd[1]: Created slice Slice /system/modprobe. Dec 3 01:41:17 localhost systemd[1]: Created slice Slice /system/serial-getty. Dec 3 01:41:17 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Dec 3 01:41:17 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Dec 3 01:41:17 localhost systemd[1]: Created slice User and Session Slice. Dec 3 01:41:17 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Dec 3 01:41:17 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Dec 3 01:41:17 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Dec 3 01:41:17 localhost systemd[1]: Reached target Local Encrypted Volumes. Dec 3 01:41:17 localhost systemd[1]: Stopped target Switch Root. Dec 3 01:41:17 localhost systemd[1]: Stopped target Initrd File Systems. Dec 3 01:41:17 localhost systemd[1]: Stopped target Initrd Root File System. Dec 3 01:41:17 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Dec 3 01:41:17 localhost systemd[1]: Reached target Path Units. Dec 3 01:41:17 localhost systemd[1]: Reached target rpc_pipefs.target. Dec 3 01:41:17 localhost systemd[1]: Reached target Slice Units. Dec 3 01:41:17 localhost systemd[1]: Reached target Swaps. Dec 3 01:41:17 localhost systemd[1]: Reached target Local Verity Protected Volumes. Dec 3 01:41:17 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Dec 3 01:41:17 localhost systemd[1]: Reached target RPC Port Mapper. Dec 3 01:41:17 localhost systemd[1]: Listening on Process Core Dump Socket. Dec 3 01:41:17 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Dec 3 01:41:17 localhost systemd[1]: Listening on udev Control Socket. Dec 3 01:41:17 localhost systemd[1]: Listening on udev Kernel Socket. Dec 3 01:41:17 localhost systemd[1]: Mounting Huge Pages File System... Dec 3 01:41:17 localhost systemd[1]: Mounting POSIX Message Queue File System... Dec 3 01:41:17 localhost systemd[1]: Mounting Kernel Debug File System... Dec 3 01:41:17 localhost systemd[1]: Mounting Kernel Trace File System... Dec 3 01:41:17 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 3 01:41:17 localhost systemd[1]: Starting Create List of Static Device Nodes... Dec 3 01:41:17 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 3 01:41:17 localhost systemd[1]: Starting Load Kernel Module drm... Dec 3 01:41:17 localhost systemd[1]: Starting Load Kernel Module fuse... Dec 3 01:41:17 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Dec 3 01:41:17 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 3 01:41:17 localhost systemd[1]: Stopped File System Check on Root Device. Dec 3 01:41:17 localhost systemd[1]: Stopped Journal Service. Dec 3 01:41:17 localhost systemd[1]: Starting Journal Service... Dec 3 01:41:17 localhost systemd[1]: Starting Load Kernel Modules... Dec 3 01:41:17 localhost systemd[1]: Starting Generate network units from Kernel command line... Dec 3 01:41:17 localhost kernel: fuse: init (API version 7.36) Dec 3 01:41:17 localhost systemd-journald[619]: Journal started Dec 3 01:41:17 localhost systemd-journald[619]: Runtime Journal (/run/log/journal/091dc475157499b18701a707a9102fd4) is 8.0M, max 314.7M, 306.7M free. Dec 3 01:41:17 localhost systemd[1]: Queued start job for default target Multi-User System. Dec 3 01:41:17 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Dec 3 01:41:17 localhost systemd-modules-load[620]: Module 'msr' is built in Dec 3 01:41:17 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Dec 3 01:41:17 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Dec 3 01:41:17 localhost systemd[1]: Starting Coldplug All udev Devices... Dec 3 01:41:17 localhost systemd[1]: Started Journal Service. Dec 3 01:41:17 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Dec 3 01:41:17 localhost systemd[1]: Mounted Huge Pages File System. Dec 3 01:41:17 localhost systemd[1]: Mounted POSIX Message Queue File System. Dec 3 01:41:17 localhost systemd[1]: Mounted Kernel Debug File System. Dec 3 01:41:17 localhost systemd[1]: Mounted Kernel Trace File System. Dec 3 01:41:17 localhost systemd[1]: Finished Create List of Static Device Nodes. Dec 3 01:41:17 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 3 01:41:17 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 3 01:41:17 localhost kernel: ACPI: bus type drm_connector registered Dec 3 01:41:17 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 3 01:41:17 localhost systemd[1]: Finished Load Kernel Module drm. Dec 3 01:41:17 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 3 01:41:17 localhost systemd[1]: Finished Load Kernel Module fuse. Dec 3 01:41:17 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Dec 3 01:41:17 localhost systemd[1]: Finished Load Kernel Modules. Dec 3 01:41:17 localhost systemd[1]: Finished Generate network units from Kernel command line. Dec 3 01:41:17 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Dec 3 01:41:17 localhost systemd[1]: Mounting FUSE Control File System... Dec 3 01:41:17 localhost systemd[1]: Mounting Kernel Configuration File System... Dec 3 01:41:17 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 3 01:41:17 localhost systemd[1]: Starting Rebuild Hardware Database... Dec 3 01:41:17 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Dec 3 01:41:17 localhost systemd[1]: Starting Load/Save Random Seed... Dec 3 01:41:17 localhost systemd[1]: Starting Apply Kernel Variables... Dec 3 01:41:17 localhost systemd[1]: Starting Create System Users... Dec 3 01:41:17 localhost systemd-journald[619]: Runtime Journal (/run/log/journal/091dc475157499b18701a707a9102fd4) is 8.0M, max 314.7M, 306.7M free. Dec 3 01:41:17 localhost systemd-journald[619]: Received client request to flush runtime journal. Dec 3 01:41:17 localhost systemd[1]: Mounted FUSE Control File System. Dec 3 01:41:17 localhost systemd[1]: Mounted Kernel Configuration File System. Dec 3 01:41:17 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Dec 3 01:41:17 localhost systemd[1]: Finished Apply Kernel Variables. Dec 3 01:41:17 localhost systemd[1]: Finished Load/Save Random Seed. Dec 3 01:41:17 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Dec 3 01:41:17 localhost systemd-sysusers[632]: Creating group 'sgx' with GID 989. Dec 3 01:41:17 localhost systemd-sysusers[632]: Creating group 'systemd-oom' with GID 988. Dec 3 01:41:17 localhost systemd-sysusers[632]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Dec 3 01:41:17 localhost systemd[1]: Finished Create System Users. Dec 3 01:41:17 localhost systemd[1]: Finished Coldplug All udev Devices. Dec 3 01:41:17 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Dec 3 01:41:17 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Dec 3 01:41:17 localhost systemd[1]: Reached target Preparation for Local File Systems. Dec 3 01:41:17 localhost systemd[1]: Set up automount EFI System Partition Automount. Dec 3 01:41:18 localhost systemd[1]: Finished Rebuild Hardware Database. Dec 3 01:41:18 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Dec 3 01:41:18 localhost systemd-udevd[636]: Using default interface naming scheme 'rhel-9.0'. Dec 3 01:41:18 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Dec 3 01:41:18 localhost systemd[1]: Starting Load Kernel Module configfs... Dec 3 01:41:18 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 3 01:41:18 localhost systemd[1]: Finished Load Kernel Module configfs. Dec 3 01:41:18 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Dec 3 01:41:18 localhost systemd-udevd[640]: Network interface NamePolicy= disabled on kernel command line. Dec 3 01:41:18 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Dec 3 01:41:18 localhost systemd[1]: Mounting /boot... Dec 3 01:41:18 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Dec 3 01:41:18 localhost kernel: XFS (vda3): Mounting V5 Filesystem Dec 3 01:41:18 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Dec 3 01:41:18 localhost kernel: XFS (vda3): Ending clean mount Dec 3 01:41:18 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Dec 3 01:41:18 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 3 01:41:18 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Dec 3 01:41:18 localhost systemd[1]: Mounted /boot. Dec 3 01:41:18 localhost systemd-fsck[688]: fsck.fat 4.2 (2021-01-31) Dec 3 01:41:18 localhost systemd-fsck[688]: /dev/vda2: 12 files, 1782/51145 clusters Dec 3 01:41:18 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Dec 3 01:41:18 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Dec 3 01:41:18 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Dec 3 01:41:18 localhost kernel: Console: switching to colour dummy device 80x25 Dec 3 01:41:18 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Dec 3 01:41:18 localhost kernel: [drm] features: -context_init Dec 3 01:41:18 localhost kernel: [drm] number of scanouts: 1 Dec 3 01:41:18 localhost kernel: [drm] number of cap sets: 0 Dec 3 01:41:18 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Dec 3 01:41:18 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Dec 3 01:41:18 localhost kernel: Console: switching to colour frame buffer device 128x48 Dec 3 01:41:18 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Dec 3 01:41:18 localhost kernel: SVM: TSC scaling supported Dec 3 01:41:18 localhost kernel: kvm: Nested Virtualization enabled Dec 3 01:41:18 localhost kernel: SVM: kvm: Nested Paging enabled Dec 3 01:41:18 localhost kernel: SVM: LBR virtualization supported Dec 3 01:41:18 localhost systemd[1]: Mounting /boot/efi... Dec 3 01:41:18 localhost systemd[1]: Mounted /boot/efi. Dec 3 01:41:18 localhost systemd[1]: Reached target Local File Systems. Dec 3 01:41:18 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Dec 3 01:41:18 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Dec 3 01:41:18 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Dec 3 01:41:18 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 3 01:41:18 localhost systemd[1]: Starting Automatic Boot Loader Update... Dec 3 01:41:18 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Dec 3 01:41:18 localhost systemd[1]: Starting Create Volatile Files and Directories... Dec 3 01:41:18 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 705 (bootctl) Dec 3 01:41:18 localhost systemd[1]: Starting File System Check on /dev/vda2... Dec 3 01:41:18 localhost systemd[1]: Finished File System Check on /dev/vda2. Dec 3 01:41:18 localhost systemd[1]: Mounting EFI System Partition Automount... Dec 3 01:41:18 localhost systemd[1]: Mounted EFI System Partition Automount. Dec 3 01:41:18 localhost systemd[1]: Finished Automatic Boot Loader Update. Dec 3 01:41:18 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Dec 3 01:41:18 localhost systemd[1]: Finished Create Volatile Files and Directories. Dec 3 01:41:18 localhost systemd[1]: Starting Security Auditing Service... Dec 3 01:41:18 localhost systemd[1]: Starting RPC Bind... Dec 3 01:41:18 localhost systemd[1]: Starting Rebuild Journal Catalog... Dec 3 01:41:18 localhost auditd[722]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Dec 3 01:41:18 localhost auditd[722]: Init complete, auditd 3.0.7 listening for events (startup state enable) Dec 3 01:41:18 localhost systemd[1]: Finished Rebuild Journal Catalog. Dec 3 01:41:18 localhost systemd[1]: Started RPC Bind. Dec 3 01:41:18 localhost systemd[1]: Starting Update is Completed... Dec 3 01:41:18 localhost systemd[1]: Finished Update is Completed. Dec 3 01:41:18 localhost augenrules[728]: /sbin/augenrules: No change Dec 3 01:41:18 localhost augenrules[742]: No rules Dec 3 01:41:18 localhost augenrules[742]: enabled 1 Dec 3 01:41:18 localhost augenrules[742]: failure 1 Dec 3 01:41:18 localhost augenrules[742]: pid 722 Dec 3 01:41:18 localhost augenrules[742]: rate_limit 0 Dec 3 01:41:18 localhost augenrules[742]: backlog_limit 8192 Dec 3 01:41:18 localhost augenrules[742]: lost 0 Dec 3 01:41:18 localhost augenrules[742]: backlog 2 Dec 3 01:41:18 localhost augenrules[742]: backlog_wait_time 60000 Dec 3 01:41:18 localhost augenrules[742]: backlog_wait_time_actual 0 Dec 3 01:41:18 localhost augenrules[742]: enabled 1 Dec 3 01:41:18 localhost augenrules[742]: failure 1 Dec 3 01:41:18 localhost augenrules[742]: pid 722 Dec 3 01:41:18 localhost augenrules[742]: rate_limit 0 Dec 3 01:41:18 localhost augenrules[742]: backlog_limit 8192 Dec 3 01:41:18 localhost augenrules[742]: lost 0 Dec 3 01:41:18 localhost augenrules[742]: backlog 0 Dec 3 01:41:18 localhost augenrules[742]: backlog_wait_time 60000 Dec 3 01:41:18 localhost augenrules[742]: backlog_wait_time_actual 0 Dec 3 01:41:18 localhost augenrules[742]: enabled 1 Dec 3 01:41:18 localhost augenrules[742]: failure 1 Dec 3 01:41:18 localhost augenrules[742]: pid 722 Dec 3 01:41:18 localhost augenrules[742]: rate_limit 0 Dec 3 01:41:18 localhost augenrules[742]: backlog_limit 8192 Dec 3 01:41:18 localhost augenrules[742]: lost 0 Dec 3 01:41:18 localhost augenrules[742]: backlog 0 Dec 3 01:41:18 localhost augenrules[742]: backlog_wait_time 60000 Dec 3 01:41:18 localhost augenrules[742]: backlog_wait_time_actual 0 Dec 3 01:41:18 localhost systemd[1]: Started Security Auditing Service. Dec 3 01:41:18 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Dec 3 01:41:18 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Dec 3 01:41:18 localhost systemd[1]: Reached target System Initialization. Dec 3 01:41:18 localhost systemd[1]: Started dnf makecache --timer. Dec 3 01:41:18 localhost systemd[1]: Started Daily rotation of log files. Dec 3 01:41:18 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Dec 3 01:41:18 localhost systemd[1]: Reached target Timer Units. Dec 3 01:41:18 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Dec 3 01:41:18 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Dec 3 01:41:18 localhost systemd[1]: Reached target Socket Units. Dec 3 01:41:18 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Dec 3 01:41:18 localhost systemd[1]: Starting D-Bus System Message Bus... Dec 3 01:41:18 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 3 01:41:18 localhost systemd[1]: Started D-Bus System Message Bus. Dec 3 01:41:18 localhost systemd[1]: Reached target Basic System. Dec 3 01:41:18 localhost journal[751]: Ready Dec 3 01:41:18 localhost systemd[1]: Starting NTP client/server... Dec 3 01:41:18 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Dec 3 01:41:19 localhost systemd[1]: Started irqbalance daemon. Dec 3 01:41:19 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Dec 3 01:41:19 localhost systemd[1]: Starting System Logging Service... Dec 3 01:41:19 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 01:41:19 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 01:41:19 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 01:41:19 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 01:41:19 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Dec 3 01:41:19 localhost systemd[1]: Reached target User and Group Name Lookups. Dec 3 01:41:19 localhost rsyslogd[759]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="759" x-info="https://www.rsyslog.com"] start Dec 3 01:41:19 localhost rsyslogd[759]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Dec 3 01:41:19 localhost systemd[1]: Starting User Login Management... Dec 3 01:41:19 localhost systemd[1]: Started System Logging Service. Dec 3 01:41:19 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Dec 3 01:41:19 localhost chronyd[766]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Dec 3 01:41:19 localhost chronyd[766]: Using right/UTC timezone to obtain leap second data Dec 3 01:41:19 localhost chronyd[766]: Loaded seccomp filter (level 2) Dec 3 01:41:19 localhost systemd[1]: Started NTP client/server. Dec 3 01:41:19 localhost systemd-logind[764]: New seat seat0. Dec 3 01:41:19 localhost systemd-logind[764]: Watching system buttons on /dev/input/event0 (Power Button) Dec 3 01:41:19 localhost systemd-logind[764]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 3 01:41:19 localhost systemd[1]: Started User Login Management. Dec 3 01:41:19 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 01:41:19 localhost cloud-init[770]: Cloud-init v. 22.1-9.el9 running 'init-local' at Wed, 03 Dec 2025 06:41:19 +0000. Up 5.53 seconds. Dec 3 01:41:19 localhost systemd[1]: Starting Hostname Service... Dec 3 01:41:19 localhost systemd[1]: Started Hostname Service. Dec 3 01:41:19 localhost systemd-hostnamed[784]: Hostname set to (static) Dec 3 01:41:19 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpygexverv.mount: Deactivated successfully. Dec 3 01:41:19 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Dec 3 01:41:19 localhost systemd[1]: Reached target Preparation for Network. Dec 3 01:41:19 localhost systemd[1]: Starting Network Manager... Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8162] NetworkManager (version 1.42.2-1.el9) is starting... (boot:f380a892-9616-461a-92e8-83074b335952) Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8168] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Dec 3 01:41:19 localhost systemd[1]: Started Network Manager. Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8204] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Dec 3 01:41:19 localhost systemd[1]: Reached target Network. Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8266] manager[0x55b4630a4020]: monitoring kernel firmware directory '/lib/firmware'. Dec 3 01:41:19 localhost systemd[1]: Starting Network Manager Wait Online... Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8299] hostname: hostname: using hostnamed Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8299] hostname: static hostname changed from (none) to "np0005543227.novalocal" Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8306] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Dec 3 01:41:19 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Dec 3 01:41:19 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Dec 3 01:41:19 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Dec 3 01:41:19 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8521] manager[0x55b4630a4020]: rfkill: Wi-Fi hardware radio set enabled Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8522] manager[0x55b4630a4020]: rfkill: WWAN hardware radio set enabled Dec 3 01:41:19 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Dec 3 01:41:19 localhost systemd[1]: Started GSSAPI Proxy Daemon. Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8569] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8570] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8573] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8573] manager: Networking is enabled by state file Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8589] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8590] settings: Loaded settings plugin: keyfile (internal) Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8615] dhcp: init: Using DHCP client 'internal' Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8618] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8633] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8639] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:41:19 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8648] device (lo): Activation: starting connection 'lo' (4229211f-5d25-4585-9553-09d059123c0a) Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8657] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8660] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Dec 3 01:41:19 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Dec 3 01:41:19 localhost systemd[1]: Reached target NFS client services. Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8708] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8711] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8714] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Dec 3 01:41:19 localhost systemd[1]: Reached target Preparation for Remote File Systems. Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8730] device (eth0): carrier: link connected Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8732] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8738] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Dec 3 01:41:19 localhost systemd[1]: Reached target Remote File Systems. Dec 3 01:41:19 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8784] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8793] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 3 01:41:19 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8797] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8803] manager: NetworkManager state is now CONNECTING Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8806] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8826] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8830] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8853] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8855] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8860] device (lo): Activation: successful, device activated. Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8875] dhcp4 (eth0): state changed new lease, address=38.102.83.220 Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8879] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8898] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8917] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8918] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8922] manager: NetworkManager state is now CONNECTED_SITE Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8925] device (eth0): Activation: successful, device activated. Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8928] manager: NetworkManager state is now CONNECTED_GLOBAL Dec 3 01:41:19 localhost NetworkManager[789]: [1764744079.8932] manager: startup complete Dec 3 01:41:19 localhost systemd[1]: Finished Network Manager Wait Online. Dec 3 01:41:19 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Dec 3 01:41:20 localhost cloud-init[984]: Cloud-init v. 22.1-9.el9 running 'init' at Wed, 03 Dec 2025 06:41:20 +0000. Up 6.35 seconds. Dec 3 01:41:20 localhost cloud-init[984]: ci-info: ++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +--------+------+-----------------------------+---------------+--------+-------------------+ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +--------+------+-----------------------------+---------------+--------+-------------------+ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | eth0 | True | 38.102.83.220 | 255.255.255.0 | global | fa:16:3e:69:03:7e | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | eth0 | True | fe80::f816:3eff:fe69:37e/64 | . | link | fa:16:3e:69:03:7e | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | lo | True | ::1/128 | . | host | . | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +--------+------+-----------------------------+---------------+--------+-------------------+ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | Route | Destination | Gateway | Interface | Flags | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: | 3 | multicast | :: | eth0 | U | Dec 3 01:41:20 localhost cloud-init[984]: ci-info: +-------+-------------+---------+-----------+-------+ Dec 3 01:41:20 localhost systemd[1]: Starting Authorization Manager... Dec 3 01:41:20 localhost polkitd[1036]: Started polkitd version 0.117 Dec 3 01:41:20 localhost systemd[1]: Started Dynamic System Tuning Daemon. Dec 3 01:41:20 localhost systemd[1]: Started Authorization Manager. Dec 3 01:41:22 localhost cloud-init[984]: Generating public/private rsa key pair. Dec 3 01:41:22 localhost cloud-init[984]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Dec 3 01:41:22 localhost cloud-init[984]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Dec 3 01:41:22 localhost cloud-init[984]: The key fingerprint is: Dec 3 01:41:22 localhost cloud-init[984]: SHA256:8WQX3JfXe7P3KFusLg565wJS09GXIfJ14BnfKbk+ayQ root@np0005543227.novalocal Dec 3 01:41:22 localhost cloud-init[984]: The key's randomart image is: Dec 3 01:41:22 localhost cloud-init[984]: +---[RSA 3072]----+ Dec 3 01:41:22 localhost cloud-init[984]: | ....*=. o| Dec 3 01:41:22 localhost cloud-init[984]: | .o.++*oo=| Dec 3 01:41:22 localhost cloud-init[984]: | ...+.+o.o+| Dec 3 01:41:22 localhost cloud-init[984]: | o .= . oo.| Dec 3 01:41:22 localhost cloud-init[984]: | . .S . . +| Dec 3 01:41:22 localhost cloud-init[984]: | . . E.o ..| Dec 3 01:41:22 localhost cloud-init[984]: | . .. ooo.o| Dec 3 01:41:22 localhost cloud-init[984]: | .o.o .++ .| Dec 3 01:41:22 localhost cloud-init[984]: | .. =oo=+ | Dec 3 01:41:22 localhost cloud-init[984]: +----[SHA256]-----+ Dec 3 01:41:22 localhost cloud-init[984]: Generating public/private ecdsa key pair. Dec 3 01:41:22 localhost cloud-init[984]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Dec 3 01:41:22 localhost cloud-init[984]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Dec 3 01:41:22 localhost cloud-init[984]: The key fingerprint is: Dec 3 01:41:22 localhost cloud-init[984]: SHA256:j07TtgexSMkmvZJebMR9iJgrEO+XlqGpEJbV1x2h2Lo root@np0005543227.novalocal Dec 3 01:41:22 localhost cloud-init[984]: The key's randomart image is: Dec 3 01:41:22 localhost cloud-init[984]: +---[ECDSA 256]---+ Dec 3 01:41:22 localhost cloud-init[984]: | . . .oo | Dec 3 01:41:22 localhost cloud-init[984]: | .. . .o... | Dec 3 01:41:22 localhost cloud-init[984]: | oo .B * . | Dec 3 01:41:22 localhost cloud-init[984]: |.o. . = @ + . | Dec 3 01:41:22 localhost cloud-init[984]: |.. o o &So + | Dec 3 01:41:22 localhost cloud-init[984]: |. = O B+o | Dec 3 01:41:22 localhost cloud-init[984]: | . . = E+ +. | Dec 3 01:41:22 localhost cloud-init[984]: | . .o o .. | Dec 3 01:41:22 localhost cloud-init[984]: | . .. | Dec 3 01:41:22 localhost cloud-init[984]: +----[SHA256]-----+ Dec 3 01:41:22 localhost cloud-init[984]: Generating public/private ed25519 key pair. Dec 3 01:41:22 localhost cloud-init[984]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Dec 3 01:41:22 localhost cloud-init[984]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Dec 3 01:41:22 localhost cloud-init[984]: The key fingerprint is: Dec 3 01:41:22 localhost cloud-init[984]: SHA256:Wicvnix2iOemkyZ8YGSb0csh4OXiPXk0HXgx5yULCbk root@np0005543227.novalocal Dec 3 01:41:22 localhost cloud-init[984]: The key's randomart image is: Dec 3 01:41:22 localhost cloud-init[984]: +--[ED25519 256]--+ Dec 3 01:41:22 localhost cloud-init[984]: | .++oo . | Dec 3 01:41:22 localhost cloud-init[984]: |. . o += + | Dec 3 01:41:22 localhost cloud-init[984]: |..o. + .o | Dec 3 01:41:22 localhost cloud-init[984]: | o=.oE . | Dec 3 01:41:22 localhost cloud-init[984]: |.oo*oo. S . | Dec 3 01:41:22 localhost cloud-init[984]: | .=+o. o + | Dec 3 01:41:22 localhost cloud-init[984]: | o .oo... . | Dec 3 01:41:22 localhost cloud-init[984]: | o * *o.o | Dec 3 01:41:22 localhost cloud-init[984]: | +.B.o+ | Dec 3 01:41:22 localhost cloud-init[984]: +----[SHA256]-----+ Dec 3 01:41:22 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Dec 3 01:41:22 localhost systemd[1]: Reached target Cloud-config availability. Dec 3 01:41:22 localhost systemd[1]: Reached target Network is Online. Dec 3 01:41:22 localhost sshd[1129]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:22 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Dec 3 01:41:22 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Dec 3 01:41:22 localhost systemd[1]: Starting Crash recovery kernel arming... Dec 3 01:41:22 localhost sm-notify[1128]: Version 2.5.4 starting Dec 3 01:41:22 localhost systemd[1]: Starting Notify NFS peers of a restart... Dec 3 01:41:22 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 01:41:22 localhost systemd[1]: Starting Permit User Sessions... Dec 3 01:41:22 localhost systemd[1]: Finished Permit User Sessions. Dec 3 01:41:22 localhost systemd[1]: Started Command Scheduler. Dec 3 01:41:22 localhost systemd[1]: Started Getty on tty1. Dec 3 01:41:22 localhost systemd[1]: Started Serial Getty on ttyS0. Dec 3 01:41:22 localhost systemd[1]: Reached target Login Prompts. Dec 3 01:41:22 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 01:41:22 localhost systemd[1]: Reached target Multi-User System. Dec 3 01:41:22 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Dec 3 01:41:22 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 3 01:41:22 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Dec 3 01:41:22 localhost systemd[1]: Started Notify NFS peers of a restart. Dec 3 01:41:22 localhost kdumpctl[1132]: kdump: No kdump initial ramdisk found. Dec 3 01:41:22 localhost kdumpctl[1132]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Dec 3 01:41:22 localhost cloud-init[1275]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Wed, 03 Dec 2025 06:41:22 +0000. Up 9.04 seconds. Dec 3 01:41:22 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Dec 3 01:41:22 localhost systemd[1]: Starting Execute cloud user/final scripts... Dec 3 01:41:23 localhost dracut[1413]: dracut-057-21.git20230214.el9 Dec 3 01:41:23 localhost cloud-init[1431]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Wed, 03 Dec 2025 06:41:23 +0000. Up 9.40 seconds. Dec 3 01:41:23 localhost dracut[1415]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Dec 3 01:41:23 localhost sshd[1469]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:23 localhost cloud-init[1477]: ############################################################# Dec 3 01:41:23 localhost cloud-init[1479]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Dec 3 01:41:23 localhost cloud-init[1490]: 256 SHA256:j07TtgexSMkmvZJebMR9iJgrEO+XlqGpEJbV1x2h2Lo root@np0005543227.novalocal (ECDSA) Dec 3 01:41:23 localhost sshd[1487]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:23 localhost cloud-init[1500]: 256 SHA256:Wicvnix2iOemkyZ8YGSb0csh4OXiPXk0HXgx5yULCbk root@np0005543227.novalocal (ED25519) Dec 3 01:41:23 localhost cloud-init[1511]: 3072 SHA256:8WQX3JfXe7P3KFusLg565wJS09GXIfJ14BnfKbk+ayQ root@np0005543227.novalocal (RSA) Dec 3 01:41:23 localhost cloud-init[1515]: -----END SSH HOST KEY FINGERPRINTS----- Dec 3 01:41:23 localhost cloud-init[1518]: ############################################################# Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 3 01:41:23 localhost sshd[1512]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:23 localhost cloud-init[1431]: Cloud-init v. 22.1-9.el9 finished at Wed, 03 Dec 2025 06:41:23 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 9.64 seconds Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 3 01:41:23 localhost sshd[1586]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:23 localhost dracut[1415]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 3 01:41:23 localhost sshd[1598]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:23 localhost dracut[1415]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 3 01:41:23 localhost sshd[1606]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:23 localhost dracut[1415]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 3 01:41:23 localhost sshd[1623]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:23 localhost dracut[1415]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 3 01:41:23 localhost systemd[1]: Reloading Network Manager... Dec 3 01:41:23 localhost dracut[1415]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 3 01:41:23 localhost sshd[1645]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:23 localhost dracut[1415]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 3 01:41:23 localhost NetworkManager[789]: [1764744083.5302] audit: op="reload" arg="0" pid=1641 uid=0 result="success" Dec 3 01:41:23 localhost NetworkManager[789]: [1764744083.5313] config: signal: SIGHUP (no changes from disk) Dec 3 01:41:23 localhost dracut[1415]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:23 localhost systemd[1]: Reloaded Network Manager. Dec 3 01:41:23 localhost systemd[1]: Finished Execute cloud user/final scripts. Dec 3 01:41:23 localhost dracut[1415]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 3 01:41:23 localhost systemd[1]: Reached target Cloud-init target. Dec 3 01:41:23 localhost sshd[1663]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:23 localhost dracut[1415]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 3 01:41:23 localhost dracut[1415]: memstrack is not available Dec 3 01:41:23 localhost dracut[1415]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Dec 3 01:41:23 localhost dracut[1415]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Dec 3 01:41:24 localhost dracut[1415]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Dec 3 01:41:24 localhost dracut[1415]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Dec 3 01:41:24 localhost dracut[1415]: memstrack is not available Dec 3 01:41:24 localhost dracut[1415]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Dec 3 01:41:24 localhost dracut[1415]: *** Including module: systemd *** Dec 3 01:41:24 localhost dracut[1415]: *** Including module: systemd-initrd *** Dec 3 01:41:24 localhost dracut[1415]: *** Including module: i18n *** Dec 3 01:41:24 localhost dracut[1415]: No KEYMAP configured. Dec 3 01:41:24 localhost dracut[1415]: *** Including module: drm *** Dec 3 01:41:24 localhost chronyd[766]: Selected source 149.56.19.163 (2.rhel.pool.ntp.org) Dec 3 01:41:24 localhost chronyd[766]: System clock TAI offset set to 37 seconds Dec 3 01:41:25 localhost dracut[1415]: *** Including module: prefixdevname *** Dec 3 01:41:25 localhost dracut[1415]: *** Including module: kernel-modules *** Dec 3 01:41:25 localhost dracut[1415]: *** Including module: kernel-modules-extra *** Dec 3 01:41:25 localhost dracut[1415]: *** Including module: qemu *** Dec 3 01:41:25 localhost dracut[1415]: *** Including module: fstab-sys *** Dec 3 01:41:25 localhost dracut[1415]: *** Including module: rootfs-block *** Dec 3 01:41:25 localhost dracut[1415]: *** Including module: terminfo *** Dec 3 01:41:25 localhost dracut[1415]: *** Including module: udev-rules *** Dec 3 01:41:26 localhost dracut[1415]: Skipping udev rule: 91-permissions.rules Dec 3 01:41:26 localhost dracut[1415]: Skipping udev rule: 80-drivers-modprobe.rules Dec 3 01:41:26 localhost dracut[1415]: *** Including module: virtiofs *** Dec 3 01:41:26 localhost dracut[1415]: *** Including module: dracut-systemd *** Dec 3 01:41:26 localhost dracut[1415]: *** Including module: usrmount *** Dec 3 01:41:26 localhost dracut[1415]: *** Including module: base *** Dec 3 01:41:26 localhost dracut[1415]: *** Including module: fs-lib *** Dec 3 01:41:26 localhost dracut[1415]: *** Including module: kdumpbase *** Dec 3 01:41:26 localhost dracut[1415]: *** Including module: microcode_ctl-fw_dir_override *** Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl module: mangling fw_dir Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: configuration "intel" is ignored Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: configuration "intel-06-2d-07" is ignored Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: configuration "intel-06-4e-03" is ignored Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: configuration "intel-06-4f-01" is ignored Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: configuration "intel-06-55-04" is ignored Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: configuration "intel-06-5e-03" is ignored Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: configuration "intel-06-8c-01" is ignored Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Dec 3 01:41:26 localhost dracut[1415]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Dec 3 01:41:27 localhost dracut[1415]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Dec 3 01:41:27 localhost dracut[1415]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Dec 3 01:41:27 localhost dracut[1415]: *** Including module: shutdown *** Dec 3 01:41:27 localhost dracut[1415]: *** Including module: squash *** Dec 3 01:41:27 localhost dracut[1415]: *** Including modules done *** Dec 3 01:41:27 localhost dracut[1415]: *** Installing kernel module dependencies *** Dec 3 01:41:27 localhost dracut[1415]: *** Installing kernel module dependencies done *** Dec 3 01:41:27 localhost dracut[1415]: *** Resolving executable dependencies *** Dec 3 01:41:28 localhost dracut[1415]: *** Resolving executable dependencies done *** Dec 3 01:41:28 localhost dracut[1415]: *** Hardlinking files *** Dec 3 01:41:29 localhost dracut[1415]: Mode: real Dec 3 01:41:29 localhost dracut[1415]: Files: 1099 Dec 3 01:41:29 localhost dracut[1415]: Linked: 3 files Dec 3 01:41:29 localhost dracut[1415]: Compared: 0 xattrs Dec 3 01:41:29 localhost dracut[1415]: Compared: 373 files Dec 3 01:41:29 localhost dracut[1415]: Saved: 61.04 KiB Dec 3 01:41:29 localhost dracut[1415]: Duration: 0.020942 seconds Dec 3 01:41:29 localhost dracut[1415]: *** Hardlinking files done *** Dec 3 01:41:29 localhost dracut[1415]: Could not find 'strip'. Not stripping the initramfs. Dec 3 01:41:29 localhost dracut[1415]: *** Generating early-microcode cpio image *** Dec 3 01:41:29 localhost dracut[1415]: *** Constructing AuthenticAMD.bin *** Dec 3 01:41:29 localhost dracut[1415]: *** Store current command line parameters *** Dec 3 01:41:29 localhost dracut[1415]: Stored kernel commandline: Dec 3 01:41:29 localhost dracut[1415]: No dracut internal kernel commandline stored in the initramfs Dec 3 01:41:29 localhost dracut[1415]: *** Install squash loader *** Dec 3 01:41:29 localhost dracut[1415]: *** Squashing the files inside the initramfs *** Dec 3 01:41:30 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 01:41:30 localhost dracut[1415]: *** Squashing the files inside the initramfs done *** Dec 3 01:41:30 localhost dracut[1415]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Dec 3 01:41:30 localhost dracut[1415]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Dec 3 01:41:31 localhost kdumpctl[1132]: kdump: kexec: loaded kdump kernel Dec 3 01:41:31 localhost kdumpctl[1132]: kdump: Starting kdump: [OK] Dec 3 01:41:31 localhost systemd[1]: Finished Crash recovery kernel arming. Dec 3 01:41:31 localhost systemd[1]: Startup finished in 1.244s (kernel) + 2.075s (initrd) + 14.305s (userspace) = 17.625s. Dec 3 01:41:49 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 01:41:58 localhost sshd[4172]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:41:58 localhost systemd[1]: Created slice User Slice of UID 1000. Dec 3 01:41:58 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Dec 3 01:41:58 localhost systemd-logind[764]: New session 1 of user zuul. Dec 3 01:41:58 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Dec 3 01:41:58 localhost systemd[1]: Starting User Manager for UID 1000... Dec 3 01:41:58 localhost systemd[4176]: Queued start job for default target Main User Target. Dec 3 01:41:58 localhost systemd[4176]: Created slice User Application Slice. Dec 3 01:41:58 localhost systemd[4176]: Started Mark boot as successful after the user session has run 2 minutes. Dec 3 01:41:58 localhost systemd[4176]: Started Daily Cleanup of User's Temporary Directories. Dec 3 01:41:58 localhost systemd[4176]: Reached target Paths. Dec 3 01:41:58 localhost systemd[4176]: Reached target Timers. Dec 3 01:41:58 localhost systemd[4176]: Starting D-Bus User Message Bus Socket... Dec 3 01:41:58 localhost systemd[4176]: Starting Create User's Volatile Files and Directories... Dec 3 01:41:58 localhost systemd[4176]: Listening on D-Bus User Message Bus Socket. Dec 3 01:41:58 localhost systemd[4176]: Reached target Sockets. Dec 3 01:41:58 localhost systemd[4176]: Finished Create User's Volatile Files and Directories. Dec 3 01:41:58 localhost systemd[4176]: Reached target Basic System. Dec 3 01:41:58 localhost systemd[4176]: Reached target Main User Target. Dec 3 01:41:58 localhost systemd[4176]: Startup finished in 145ms. Dec 3 01:41:58 localhost systemd[1]: Started User Manager for UID 1000. Dec 3 01:41:58 localhost systemd[1]: Started Session 1 of User zuul. Dec 3 01:41:59 localhost python3[4228]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:06 localhost python3[4247]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:15 localhost python3[4300]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:16 localhost python3[4330]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Dec 3 01:42:19 localhost python3[4346]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:20 localhost python3[4360]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:21 localhost python3[4419]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:21 localhost python3[4460]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764744140.8394723-345-60435102358485/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa follow=False checksum=9b3b0b96dc6fc77189c35f68399e9ed1b064c3ee backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:22 localhost python3[4533]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:23 localhost python3[4574]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764744142.4615653-445-89590941963939/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa.pub follow=False checksum=46a348b05953740ee1ba05abb28a06a2e244afc4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:25 localhost python3[4602]: ansible-ping Invoked with data=pong Dec 3 01:42:27 localhost python3[4616]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 01:42:30 localhost python3[4669]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Dec 3 01:42:32 localhost python3[4691]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:32 localhost python3[4705]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:33 localhost python3[4719]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:34 localhost python3[4733]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:34 localhost python3[4747]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:34 localhost python3[4761]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:37 localhost python3[4777]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:38 localhost python3[4825]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:39 localhost python3[4868]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744158.338201-58-64410448829700/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:40 localhost python3[4897]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:40 localhost python3[4911]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4925]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4939]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4953]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:41 localhost python3[4967]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[4981]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[4995]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[5009]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:42 localhost python3[5023]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5037]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5051]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5065]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:43 localhost python3[5079]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5093]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5107]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5121]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:44 localhost python3[5135]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5149]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5163]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5177]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:45 localhost python3[5191]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5205]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDZdI7t1cxYx65heVI24HTV4F7oQLW1zyfxHreL2TIJKxjyrUUKIFEUmTutcBlJRLNT2Eoix6x1sOw9YrchloCLcn//SGfTElr9mSc5jbjb7QXEU+zJMhtxyEJ1Po3CUGnj7ckiIXw7wcawZtrEOAQ9pH3ExYCJcEMiyNjRQZCxT3tPK+S4B95EWh5Fsrz9CkwpjNRPPH7LigCeQTM3Wc7r97utAslBUUvYceDSLA7rMgkitJE38b7rZBeYzsGQ8YYUBjTCtehqQXxCRjizbHWaaZkBU+N3zkKB6n/iCNGIO690NK7A/qb6msTijiz1PeuM8ThOsi9qXnbX5v0PoTpcFSojV7NHAQ71f0XXuS43FhZctT+Dcx44dT8Fb5vJu2cJGrk+qF8ZgJYNpRS7gPg0EG2EqjK7JMf9ULdjSu0r+KlqIAyLvtzT4eOnQipoKlb/WG5D/0ohKv7OMQ352ggfkBFIQsRXyyTCT98Ft9juqPuahi3CAQmP4H9dyE+7+Kz437PEtsxLmfm6naNmWi7Ee1DqWPwS8rEajsm4sNM4wW9gdBboJQtc0uZw0DfLj1I9r3Mc8Ol0jYtz0yNQDSzVLrGCaJlC311trU70tZ+ZkAVV6Mn8lOhSbj1cK0lvSr6ZK4dgqGl3I1eTZJJhbLNdg7UOVaiRx9543+C/p/As7w== brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5219]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5233]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:46 localhost python3[5247]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 01:42:55 localhost python3[5263]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Dec 3 01:42:55 localhost systemd[1]: Starting Time & Date Service... Dec 3 01:42:55 localhost systemd[1]: Started Time & Date Service. Dec 3 01:42:55 localhost systemd-timedated[5265]: Changed time zone to 'UTC' (UTC). Dec 3 01:42:57 localhost python3[5284]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:58 localhost python3[5330]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:42:58 localhost python3[5371]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1764744178.1307359-456-54256685518772/source _original_basename=tmpuvxtilqu follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:42:59 localhost python3[5431]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:43:00 localhost python3[5472]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1764744179.6378098-544-121698058999471/source _original_basename=tmpw5530i0_ follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:01 localhost python3[5534]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:43:02 localhost python3[5577]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1764744181.5849864-693-26479058825914/source _original_basename=tmpq83413x4 follow=False checksum=a6f52f721c1f41e1ab4b26154f6ef99f64686d2d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:03 localhost python3[5605]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:43:03 localhost python3[5621]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:43:04 localhost python3[5671]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:43:04 localhost python3[5714]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744184.4114406-815-226969537317113/source _original_basename=tmpozi1o2_k follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:06 localhost python3[5745]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163e3b-3c83-e553-08c0-000000000023-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:43:07 localhost python3[5763]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-e553-08c0-000000000024-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 3 01:43:10 localhost python3[5781]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:43:25 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Dec 3 01:43:28 localhost python3[5800]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:44:23 localhost systemd[4176]: Starting Mark boot as successful... Dec 3 01:44:23 localhost systemd[4176]: Finished Mark boot as successful. Dec 3 01:44:28 localhost systemd-logind[764]: Session 1 logged out. Waiting for processes to exit. Dec 3 01:45:20 localhost systemd[1]: Unmounting EFI System Partition Automount... Dec 3 01:45:20 localhost systemd[1]: efi.mount: Deactivated successfully. Dec 3 01:45:20 localhost systemd[1]: Unmounted EFI System Partition Automount. Dec 3 01:46:14 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Dec 3 01:46:14 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Dec 3 01:46:14 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Dec 3 01:46:14 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Dec 3 01:46:14 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Dec 3 01:46:14 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Dec 3 01:46:14 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Dec 3 01:46:14 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Dec 3 01:46:14 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Dec 3 01:46:14 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2167] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Dec 3 01:46:14 localhost systemd-udevd[5806]: Network interface NamePolicy= disabled on kernel command line. Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2294] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2327] settings: (eth1): created default wired connection 'Wired connection 1' Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2332] device (eth1): carrier: link connected Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2334] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2342] policy: auto-activating connection 'Wired connection 1' (d2f03ec7-8fdc-3c9f-995d-8df58019f467) Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2348] device (eth1): Activation: starting connection 'Wired connection 1' (d2f03ec7-8fdc-3c9f-995d-8df58019f467) Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2349] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2354] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2360] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Dec 3 01:46:14 localhost NetworkManager[789]: [1764744374.2364] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:46:15 localhost sshd[5809]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:15 localhost systemd-logind[764]: New session 3 of user zuul. Dec 3 01:46:15 localhost systemd[1]: Started Session 3 of User zuul. Dec 3 01:46:15 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Dec 3 01:46:15 localhost python3[5826]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163e3b-3c83-b201-178d-00000000032e-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:46:28 localhost python3[5876]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:46:28 localhost python3[5919]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764744388.1801336-384-258984424517842/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=cacd64b768747fe0706cc15147ca770cd744a1eb backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:46:29 localhost python3[5949]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 01:46:29 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Dec 3 01:46:29 localhost systemd[1]: Stopped Network Manager Wait Online. Dec 3 01:46:29 localhost systemd[1]: Stopping Network Manager Wait Online... Dec 3 01:46:29 localhost systemd[1]: Stopping Network Manager... Dec 3 01:46:29 localhost NetworkManager[789]: [1764744389.4934] caught SIGTERM, shutting down normally. Dec 3 01:46:29 localhost NetworkManager[789]: [1764744389.5125] dhcp4 (eth0): canceled DHCP transaction Dec 3 01:46:29 localhost NetworkManager[789]: [1764744389.5126] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:46:29 localhost NetworkManager[789]: [1764744389.5126] dhcp4 (eth0): state changed no lease Dec 3 01:46:29 localhost NetworkManager[789]: [1764744389.5131] manager: NetworkManager state is now CONNECTING Dec 3 01:46:29 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 01:46:29 localhost NetworkManager[789]: [1764744389.5235] dhcp4 (eth1): canceled DHCP transaction Dec 3 01:46:29 localhost NetworkManager[789]: [1764744389.5236] dhcp4 (eth1): state changed no lease Dec 3 01:46:29 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 01:46:29 localhost NetworkManager[789]: [1764744389.5314] exiting (success) Dec 3 01:46:29 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Dec 3 01:46:29 localhost systemd[1]: Stopped Network Manager. Dec 3 01:46:29 localhost systemd[1]: NetworkManager.service: Consumed 1.762s CPU time. Dec 3 01:46:29 localhost systemd[1]: Starting Network Manager... Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.5829] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:f380a892-9616-461a-92e8-83074b335952) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.5833] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.5860] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Dec 3 01:46:29 localhost systemd[1]: Started Network Manager. Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.5902] manager[0x561ad0d92090]: monitoring kernel firmware directory '/lib/firmware'. Dec 3 01:46:29 localhost systemd[1]: Starting Network Manager Wait Online... Dec 3 01:46:29 localhost systemd[1]: Starting Hostname Service... Dec 3 01:46:29 localhost systemd[1]: Started Hostname Service. Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6767] hostname: hostname: using hostnamed Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6767] hostname: static hostname changed from (none) to "np0005543227.novalocal" Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6774] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6780] manager[0x561ad0d92090]: rfkill: Wi-Fi hardware radio set enabled Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6780] manager[0x561ad0d92090]: rfkill: WWAN hardware radio set enabled Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6811] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6811] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6812] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6812] manager: Networking is enabled by state file Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6818] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6819] settings: Loaded settings plugin: keyfile (internal) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6850] dhcp: init: Using DHCP client 'internal' Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6853] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6858] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6864] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6871] device (lo): Activation: starting connection 'lo' (4229211f-5d25-4585-9553-09d059123c0a) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6877] device (eth0): carrier: link connected Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6881] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6886] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6886] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6893] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6899] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6904] device (eth1): carrier: link connected Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6908] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6912] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (d2f03ec7-8fdc-3c9f-995d-8df58019f467) (indicated) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6913] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6918] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6925] device (eth1): Activation: starting connection 'Wired connection 1' (d2f03ec7-8fdc-3c9f-995d-8df58019f467) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6943] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6946] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6957] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6961] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6967] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6970] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6973] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6977] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6986] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.6990] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7002] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7005] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7051] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7058] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7064] device (lo): Activation: successful, device activated. Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7106] dhcp4 (eth0): state changed new lease, address=38.102.83.220 Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7113] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7209] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7238] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7240] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7246] manager: NetworkManager state is now CONNECTED_SITE Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7256] device (eth0): Activation: successful, device activated. Dec 3 01:46:29 localhost NetworkManager[5961]: [1764744389.7262] manager: NetworkManager state is now CONNECTED_GLOBAL Dec 3 01:46:29 localhost python3[6022]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163e3b-3c83-b201-178d-000000000115-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:46:36 localhost sshd[6033]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:38 localhost sshd[6035]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:39 localhost sshd[6037]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:39 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 01:46:40 localhost sshd[6039]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:42 localhost sshd[6041]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:46:59 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 01:47:14 localhost NetworkManager[5961]: [1764744434.7703] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Dec 3 01:47:14 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 01:47:14 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 01:47:14 localhost NetworkManager[5961]: [1764744434.7948] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Dec 3 01:47:14 localhost NetworkManager[5961]: [1764744434.7951] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Dec 3 01:47:14 localhost NetworkManager[5961]: [1764744434.7967] device (eth1): Activation: successful, device activated. Dec 3 01:47:14 localhost NetworkManager[5961]: [1764744434.7978] manager: startup complete Dec 3 01:47:14 localhost systemd[1]: Finished Network Manager Wait Online. Dec 3 01:47:23 localhost systemd[4176]: Created slice User Background Tasks Slice. Dec 3 01:47:23 localhost systemd[4176]: Starting Cleanup of User's Temporary Files and Directories... Dec 3 01:47:23 localhost systemd[4176]: Finished Cleanup of User's Temporary Files and Directories. Dec 3 01:47:24 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 01:47:30 localhost systemd[1]: session-3.scope: Deactivated successfully. Dec 3 01:47:30 localhost systemd[1]: session-3.scope: Consumed 1.472s CPU time. Dec 3 01:47:30 localhost systemd-logind[764]: Session 3 logged out. Waiting for processes to exit. Dec 3 01:47:30 localhost systemd-logind[764]: Removed session 3. Dec 3 01:49:04 localhost sshd[6063]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:49:04 localhost systemd-logind[764]: New session 4 of user zuul. Dec 3 01:49:04 localhost systemd[1]: Started Session 4 of User zuul. Dec 3 01:49:04 localhost python3[6114]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:49:04 localhost python3[6157]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744544.3752117-628-266327858316874/source _original_basename=tmpuj8ybg0t follow=False checksum=d2d04de4e9682d62b2573337e7b0c42a9a07ab3d backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:49:11 localhost systemd[1]: session-4.scope: Deactivated successfully. Dec 3 01:49:11 localhost systemd-logind[764]: Session 4 logged out. Waiting for processes to exit. Dec 3 01:49:11 localhost systemd-logind[764]: Removed session 4. Dec 3 01:49:32 localhost sshd[6172]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:49:34 localhost sshd[6174]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:49:35 localhost sshd[6176]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:49:38 localhost sshd[6178]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:49:39 localhost sshd[6180]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:50:18 localhost sshd[6183]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:50:21 localhost sshd[6185]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:50:23 localhost sshd[6187]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:50:24 localhost sshd[6189]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:50:26 localhost sshd[6191]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:56:19 localhost sshd[6196]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:56:19 localhost systemd[1]: Starting Cleanup of Temporary Directories... Dec 3 01:56:19 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Dec 3 01:56:19 localhost systemd[1]: Finished Cleanup of Temporary Directories. Dec 3 01:56:19 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Dec 3 01:56:19 localhost systemd-logind[764]: New session 5 of user zuul. Dec 3 01:56:19 localhost systemd[1]: Started Session 5 of User zuul. Dec 3 01:56:19 localhost python3[6218]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-ef11-07b0-000000001d0c-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:30 localhost python3[6238]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:30 localhost python3[6254]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:30 localhost python3[6270]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:31 localhost python3[6286]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:32 localhost python3[6302]: ansible-ansible.builtin.file Invoked with path=/etc/systemd/system.conf.d state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:33 localhost python3[6350]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system.conf.d/override.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 01:56:33 localhost python3[6393]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system.conf.d/override.conf mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1764744993.049439-605-179658026941004/source _original_basename=tmpg0je1qx8 follow=False checksum=a05098bd3d2321238ea1169d0e6f135b35b392d4 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 01:56:35 localhost python3[6423]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Dec 3 01:56:35 localhost systemd[1]: Reloading. Dec 3 01:56:35 localhost systemd-rc-local-generator[6441]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 01:56:35 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 01:56:37 localhost python3[6470]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Dec 3 01:56:37 localhost python3[6486]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:38 localhost python3[6504]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:38 localhost python3[6522]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:38 localhost python3[6540]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:40 localhost python3[6557]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-ef11-07b0-000000001d13-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:56:51 localhost python3[6577]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 01:56:54 localhost systemd[1]: session-5.scope: Deactivated successfully. Dec 3 01:56:54 localhost systemd[1]: session-5.scope: Consumed 3.947s CPU time. Dec 3 01:56:54 localhost systemd-logind[764]: Session 5 logged out. Waiting for processes to exit. Dec 3 01:56:54 localhost systemd-logind[764]: Removed session 5. Dec 3 01:57:15 localhost sshd[6581]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:58:10 localhost sshd[6584]: main: sshd: ssh-rsa algorithm is disabled Dec 3 01:58:10 localhost systemd-logind[764]: New session 6 of user zuul. Dec 3 01:58:10 localhost systemd[1]: Started Session 6 of User zuul. Dec 3 01:58:11 localhost systemd[1]: Starting RHSM dbus service... Dec 3 01:58:11 localhost systemd[1]: Started RHSM dbus service. Dec 3 01:58:11 localhost rhsm-service[6608]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:11 localhost rhsm-service[6608]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:11 localhost rhsm-service[6608]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:11 localhost rhsm-service[6608]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:12 localhost rhsm-service[6608]: INFO [subscription_manager.managerlib:90] Consumer created: np0005543227.novalocal (4c3de8c2-9745-4ca3-b732-b062745e47bc) Dec 3 01:58:12 localhost subscription-manager[6608]: Registered system with identity: 4c3de8c2-9745-4ca3-b732-b062745e47bc Dec 3 01:58:13 localhost rhsm-service[6608]: INFO [subscription_manager.entcertlib:131] certs updated: Dec 3 01:58:13 localhost rhsm-service[6608]: Total updates: 1 Dec 3 01:58:13 localhost rhsm-service[6608]: Found (local) serial# [] Dec 3 01:58:13 localhost rhsm-service[6608]: Expected (UEP) serial# [147671950524239221] Dec 3 01:58:13 localhost rhsm-service[6608]: Added (new) Dec 3 01:58:13 localhost rhsm-service[6608]: [sn:147671950524239221 ( Content Access,) @ /etc/pki/entitlement/147671950524239221.pem] Dec 3 01:58:13 localhost rhsm-service[6608]: Deleted (rogue): Dec 3 01:58:13 localhost rhsm-service[6608]: Dec 3 01:58:13 localhost subscription-manager[6608]: Added subscription for 'Content Access' contract 'None' Dec 3 01:58:13 localhost subscription-manager[6608]: Added subscription for product ' Content Access' Dec 3 01:58:14 localhost rhsm-service[6608]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:14 localhost rhsm-service[6608]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Dec 3 01:58:14 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:14 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:14 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:14 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:15 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:22 localhost python3[6699]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163e3b-3c83-ef61-b9c4-00000000000d-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 01:58:24 localhost python3[6718]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 01:58:53 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:58:55 localhost setsebool[6912]: The virt_use_nfs policy boolean was changed to 1 by root Dec 3 01:58:55 localhost setsebool[6912]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Dec 3 01:59:04 localhost kernel: SELinux: Converting 406 SID table entries... Dec 3 01:59:04 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 01:59:04 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 01:59:04 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 01:59:04 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 01:59:04 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 01:59:04 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 01:59:04 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 01:59:15 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=3 res=1 Dec 3 01:59:16 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 01:59:16 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 01:59:16 localhost systemd[1]: Reloading. Dec 3 01:59:16 localhost systemd-rc-local-generator[7781]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 01:59:16 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 01:59:16 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 01:59:17 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:59:17 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 01:59:24 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 01:59:24 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 01:59:24 localhost systemd[1]: man-db-cache-update.service: Consumed 10.263s CPU time. Dec 3 01:59:24 localhost systemd[1]: run-r92b560fb3d694a7eb03fad5867a3ba5f.service: Deactivated successfully. Dec 3 02:00:13 localhost podman[18503]: 2025-12-03 07:00:13.562276161 +0000 UTC m=+0.086851444 system refresh Dec 3 02:00:14 localhost systemd[4176]: Starting D-Bus User Message Bus... Dec 3 02:00:14 localhost dbus-broker-launch[18560]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Dec 3 02:00:14 localhost dbus-broker-launch[18560]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Dec 3 02:00:14 localhost systemd[4176]: Started D-Bus User Message Bus. Dec 3 02:00:14 localhost journal[18560]: Ready Dec 3 02:00:14 localhost systemd[4176]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Dec 3 02:00:14 localhost systemd[4176]: Created slice Slice /user. Dec 3 02:00:14 localhost systemd[4176]: podman-18544.scope: unit configures an IP firewall, but not running as root. Dec 3 02:00:14 localhost systemd[4176]: (This warning is only shown for the first unit using IP firewalling.) Dec 3 02:00:14 localhost systemd[4176]: Started podman-18544.scope. Dec 3 02:00:14 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 02:00:14 localhost systemd[4176]: Started podman-pause-50a92e44.scope. Dec 3 02:00:17 localhost systemd[1]: session-6.scope: Deactivated successfully. Dec 3 02:00:17 localhost systemd[1]: session-6.scope: Consumed 50.216s CPU time. Dec 3 02:00:17 localhost systemd-logind[764]: Session 6 logged out. Waiting for processes to exit. Dec 3 02:00:17 localhost systemd-logind[764]: Removed session 6. Dec 3 02:00:32 localhost sshd[18565]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:32 localhost sshd[18564]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:32 localhost sshd[18568]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:32 localhost sshd[18566]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:32 localhost sshd[18567]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:38 localhost sshd[18574]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:00:38 localhost systemd-logind[764]: New session 7 of user zuul. Dec 3 02:00:38 localhost systemd[1]: Started Session 7 of User zuul. Dec 3 02:00:38 localhost python3[18591]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPQSwfFxvY+jBWbbYO4QiRXKuP8EaSYDx+BvbwNKUrEzFdLhHdowabjwGeAW/HzM13HZM4Kh3Din31Kyrzy2isM= zuul@np0005543222.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:00:39 localhost python3[18607]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPQSwfFxvY+jBWbbYO4QiRXKuP8EaSYDx+BvbwNKUrEzFdLhHdowabjwGeAW/HzM13HZM4Kh3Din31Kyrzy2isM= zuul@np0005543222.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:00:41 localhost systemd[1]: session-7.scope: Deactivated successfully. Dec 3 02:00:41 localhost systemd-logind[764]: Session 7 logged out. Waiting for processes to exit. Dec 3 02:00:41 localhost systemd-logind[764]: Removed session 7. Dec 3 02:02:09 localhost sshd[18625]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:02:09 localhost systemd-logind[764]: New session 8 of user zuul. Dec 3 02:02:09 localhost systemd[1]: Started Session 8 of User zuul. Dec 3 02:02:09 localhost python3[18644]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDGubqW6Tr0tDqoZvUu/bxJsqy4cocS8W6FV4CM95kfJlirsolfU35ZLVxzkDyUnHaRj2bs6Ygy8qJxfLK0mSzgYLtTd3ZvC6VayZMbDuT44khGCkPQrlRcQBmhHVHeaT4gZw5z/jjNJPjpw/QLpY/BbAOUZY6OsuF+LbyP0/EF2vOepqRxTHXLDMhjEgeQQ1hwWT/s0dG6PmkNVutgDCjhsFXEX4pQsxcGYyq+YASQWGHxr5xcLOcSHw/57QWvJvKuJjhGGFRCpiLNVGKh3rnCNKcaan4h/onUmg6Syw7OLF0gddKoui7m3CkNkHdvoYYmyDmGW1pEhwIEzDEZc/UcPSWS4bSIuNBL6BJ2S7+x4Pkh5iOi9ZpfrC0qnNO8eUGCappY/M520m1IOZMjIfcIsYzm+U+FBgN+DPWPeaGYIbC/E29whTF3mIWWUNIX4tLNK1+3VqJFSqSBEJDiX3IkfOK1tkDxZuYgcs8DzSidhiqgLjUhH8/tJW+Od8Qzp9U= zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:02:11 localhost python3[18660]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005543227.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Dec 3 02:02:12 localhost python3[18710]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:12 localhost python3[18753]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764745331.9152818-94-12875867837654/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa follow=False checksum=9b3b0b96dc6fc77189c35f68399e9ed1b064c3ee backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:14 localhost python3[18815]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:14 localhost python3[18858]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764745333.8120914-183-248379736120028/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=3eb220408bb347258831b7bb13243a2c_id_rsa.pub follow=False checksum=46a348b05953740ee1ba05abb28a06a2e244afc4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:16 localhost python3[18888]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:17 localhost python3[18934]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:18 localhost python3[18950]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmp3r9y34rh recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:19 localhost python3[19010]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:19 localhost python3[19026]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmp_yi6nijk recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:20 localhost python3[19086]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:02:21 localhost python3[19102]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmp0hr62ri7 recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:02:22 localhost systemd[1]: session-8.scope: Deactivated successfully. Dec 3 02:02:22 localhost systemd[1]: session-8.scope: Consumed 3.440s CPU time. Dec 3 02:02:22 localhost systemd-logind[764]: Session 8 logged out. Waiting for processes to exit. Dec 3 02:02:22 localhost systemd-logind[764]: Removed session 8. Dec 3 02:03:51 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:04:41 localhost sshd[19122]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:04:41 localhost systemd-logind[764]: New session 9 of user zuul. Dec 3 02:04:41 localhost systemd[1]: Started Session 9 of User zuul. Dec 3 02:04:41 localhost python3[19168]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:06:19 localhost sshd[19170]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:09:41 localhost systemd[1]: session-9.scope: Deactivated successfully. Dec 3 02:09:41 localhost systemd-logind[764]: Session 9 logged out. Waiting for processes to exit. Dec 3 02:09:41 localhost systemd-logind[764]: Removed session 9. Dec 3 02:16:04 localhost sshd[19177]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:16:04 localhost systemd-logind[764]: New session 10 of user zuul. Dec 3 02:16:04 localhost systemd[1]: Started Session 10 of User zuul. Dec 3 02:16:05 localhost python3[19194]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000000c-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:16:16 localhost python3[19215]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000000d-1-overcloudcontroller2 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:16:31 localhost python3[19234]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Dec 3 02:16:34 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:16:34 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:29 localhost python3[19451]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Dec 3 02:17:32 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:32 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:40 localhost python3[19592]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Dec 3 02:17:43 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:43 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:48 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:17:49 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:12 localhost python3[19986]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Dec 3 02:18:15 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:15 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:21 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:21 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:43 localhost python3[20381]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Dec 3 02:18:46 localhost sshd[20442]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:18:46 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:46 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:47 localhost sshd[20510]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:18:49 localhost sshd[20570]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:18:50 localhost sshd[20574]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:18:51 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:18:52 localhost sshd[20637]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:18:52 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:19:16 localhost python3[20729]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000013-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:19:31 localhost python3[20748]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:19:43 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Dec 3 02:19:52 localhost kernel: SELinux: Converting 499 SID table entries... Dec 3 02:19:52 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:19:52 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:19:52 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:19:52 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:19:52 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:19:52 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:19:52 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:19:55 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=4 res=1 Dec 3 02:19:55 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:19:55 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:19:55 localhost systemd[1]: Reloading. Dec 3 02:19:55 localhost systemd-rc-local-generator[21411]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:19:55 localhost systemd-sysv-generator[21416]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:19:55 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:19:56 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:19:56 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:19:56 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:19:56 localhost systemd[1]: run-r72651322c62e467aaf974f6bccf2421f.service: Deactivated successfully. Dec 3 02:19:57 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:19:57 localhost rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 02:20:26 localhost python3[21958]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000015-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:21:07 localhost python3[21978]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:21:08 localhost python3[22026]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:21:09 localhost python3[22069]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764746468.4351842-289-245890575206980/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=aed8e312f8ee66e212b5f9a6cd551423fddc0577 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:21:10 localhost python3[22099]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:10 localhost systemd-journald[619]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 89.2 (297 of 333 items), suggesting rotation. Dec 3 02:21:10 localhost systemd-journald[619]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 02:21:10 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:21:10 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:21:10 localhost python3[22120]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:12 localhost python3[22140]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:12 localhost python3[22160]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:12 localhost python3[22180]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Dec 3 02:21:15 localhost python3[22200]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:21:15 localhost systemd[1]: Starting LSB: Bring up/down networking... Dec 3 02:21:15 localhost network[22203]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Dec 3 02:21:15 localhost network[22214]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Dec 3 02:21:15 localhost network[22203]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:15 localhost network[22215]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:15 localhost network[22203]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Dec 3 02:21:15 localhost network[22216]: It is advised to switch to 'NetworkManager' instead for network management. Dec 3 02:21:15 localhost NetworkManager[5961]: [1764746475.3183] audit: op="connections-reload" pid=22244 uid=0 result="success" Dec 3 02:21:15 localhost network[22203]: Bringing up loopback interface: [ OK ] Dec 3 02:21:15 localhost NetworkManager[5961]: [1764746475.5024] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=22332 uid=0 result="success" Dec 3 02:21:15 localhost network[22203]: Bringing up interface eth0: [ OK ] Dec 3 02:21:15 localhost systemd[1]: Started LSB: Bring up/down networking. Dec 3 02:21:15 localhost python3[22374]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch Database Unit... Dec 3 02:21:16 localhost chown[22378]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Dec 3 02:21:16 localhost ovs-ctl[22383]: /etc/openvswitch/conf.db does not exist ... (warning). Dec 3 02:21:16 localhost ovs-ctl[22383]: Creating empty database /etc/openvswitch/conf.db [ OK ] Dec 3 02:21:16 localhost ovs-ctl[22383]: Starting ovsdb-server [ OK ] Dec 3 02:21:16 localhost ovs-vsctl[22432]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Dec 3 02:21:16 localhost ovs-vsctl[22452]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.6-141.el9fdp "external-ids:system-id=\"f355dc06-6e63-4d18-8cf0-f4f6412b5ad1\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Dec 3 02:21:16 localhost ovs-ctl[22383]: Configuring Open vSwitch system IDs [ OK ] Dec 3 02:21:16 localhost ovs-vsctl[22458]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005543227.novalocal Dec 3 02:21:16 localhost ovs-ctl[22383]: Enabling remote OVSDB managers [ OK ] Dec 3 02:21:16 localhost systemd[1]: Started Open vSwitch Database Unit. Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Dec 3 02:21:16 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Dec 3 02:21:16 localhost kernel: openvswitch: Open vSwitch switching datapath Dec 3 02:21:16 localhost ovs-ctl[22502]: Inserting openvswitch module [ OK ] Dec 3 02:21:16 localhost ovs-ctl[22471]: Starting ovs-vswitchd [ OK ] Dec 3 02:21:16 localhost ovs-vsctl[22520]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005543227.novalocal Dec 3 02:21:16 localhost ovs-ctl[22471]: Enabling remote OVSDB managers [ OK ] Dec 3 02:21:16 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Dec 3 02:21:16 localhost systemd[1]: Starting Open vSwitch... Dec 3 02:21:16 localhost systemd[1]: Finished Open vSwitch. Dec 3 02:21:21 localhost python3[22538]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000001a-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.1122] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22696 uid=0 result="success" Dec 3 02:21:22 localhost ifup[22697]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:22 localhost ifup[22698]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:22 localhost ifup[22699]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.1366] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22705 uid=0 result="success" Dec 3 02:21:22 localhost ovs-vsctl[22707]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:8a:88:f0 -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Dec 3 02:21:22 localhost kernel: device ovs-system entered promiscuous mode Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.2007] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Dec 3 02:21:22 localhost systemd-udevd[22709]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:22 localhost kernel: Timeout policy base is empty Dec 3 02:21:22 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Dec 3 02:21:22 localhost systemd-udevd[22724]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:22 localhost kernel: device br-ex entered promiscuous mode Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.2439] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.2704] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22735 uid=0 result="success" Dec 3 02:21:22 localhost NetworkManager[5961]: [1764746482.2880] device (br-ex): carrier: link connected Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.3402] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22764 uid=0 result="success" Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.3844] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22779 uid=0 result="success" Dec 3 02:21:25 localhost NET[22804]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4733] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4835] dhcp4 (eth1): canceled DHCP transaction Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4836] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4836] dhcp4 (eth1): state changed no lease Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.4877] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22813 uid=0 result="success" Dec 3 02:21:25 localhost ifup[22814]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:25 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 02:21:25 localhost ifup[22815]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:25 localhost ifup[22817]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:25 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.5279] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22832 uid=0 result="success" Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.5724] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22841 uid=0 result="success" Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.5783] device (eth1): carrier: link connected Dec 3 02:21:25 localhost NetworkManager[5961]: [1764746485.6002] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22850 uid=0 result="success" Dec 3 02:21:25 localhost ipv6_wait_tentative[22862]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Dec 3 02:21:26 localhost ipv6_wait_tentative[22867]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.6715] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22877 uid=0 result="success" Dec 3 02:21:27 localhost ovs-vsctl[22892]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Dec 3 02:21:27 localhost kernel: device eth1 entered promiscuous mode Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.7503] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22899 uid=0 result="success" Dec 3 02:21:27 localhost ifup[22900]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:27 localhost ifup[22901]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:27 localhost ifup[22902]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.7835] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22908 uid=0 result="success" Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.8272] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22918 uid=0 result="success" Dec 3 02:21:27 localhost ifup[22919]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:27 localhost ifup[22920]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:27 localhost ifup[22921]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.8592] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22927 uid=0 result="success" Dec 3 02:21:27 localhost ovs-vsctl[22930]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Dec 3 02:21:27 localhost kernel: device vlan20 entered promiscuous mode Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.9000] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Dec 3 02:21:27 localhost systemd-udevd[22932]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.9280] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22941 uid=0 result="success" Dec 3 02:21:27 localhost NetworkManager[5961]: [1764746487.9486] device (vlan20): carrier: link connected Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.0003] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22970 uid=0 result="success" Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.0445] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22985 uid=0 result="success" Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.1056] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23006 uid=0 result="success" Dec 3 02:21:31 localhost ifup[23007]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:31 localhost ifup[23008]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:31 localhost ifup[23009]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.1363] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23015 uid=0 result="success" Dec 3 02:21:31 localhost ovs-vsctl[23018]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Dec 3 02:21:31 localhost kernel: device vlan44 entered promiscuous mode Dec 3 02:21:31 localhost systemd-udevd[23020]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.1700] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.1944] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23030 uid=0 result="success" Dec 3 02:21:31 localhost NetworkManager[5961]: [1764746491.2143] device (vlan44): carrier: link connected Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.2732] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23060 uid=0 result="success" Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.3198] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23075 uid=0 result="success" Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.3816] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23096 uid=0 result="success" Dec 3 02:21:34 localhost ifup[23097]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:34 localhost ifup[23098]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:34 localhost ifup[23099]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.4131] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23105 uid=0 result="success" Dec 3 02:21:34 localhost ovs-vsctl[23108]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Dec 3 02:21:34 localhost kernel: device vlan22 entered promiscuous mode Dec 3 02:21:34 localhost systemd-udevd[23110]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.4860] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.5106] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23120 uid=0 result="success" Dec 3 02:21:34 localhost NetworkManager[5961]: [1764746494.5314] device (vlan22): carrier: link connected Dec 3 02:21:35 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.5763] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23150 uid=0 result="success" Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.6138] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23165 uid=0 result="success" Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.6648] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23186 uid=0 result="success" Dec 3 02:21:37 localhost ifup[23187]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:37 localhost ifup[23188]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:37 localhost ifup[23189]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.6931] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23195 uid=0 result="success" Dec 3 02:21:37 localhost ovs-vsctl[23198]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Dec 3 02:21:37 localhost systemd-udevd[23200]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:37 localhost kernel: device vlan23 entered promiscuous mode Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.7680] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.7921] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23210 uid=0 result="success" Dec 3 02:21:37 localhost NetworkManager[5961]: [1764746497.8116] device (vlan23): carrier: link connected Dec 3 02:21:40 localhost NetworkManager[5961]: [1764746500.8620] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23240 uid=0 result="success" Dec 3 02:21:40 localhost NetworkManager[5961]: [1764746500.9072] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23255 uid=0 result="success" Dec 3 02:21:40 localhost NetworkManager[5961]: [1764746500.9712] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23276 uid=0 result="success" Dec 3 02:21:40 localhost ifup[23277]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:40 localhost ifup[23278]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:40 localhost ifup[23279]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:41 localhost NetworkManager[5961]: [1764746501.0033] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23285 uid=0 result="success" Dec 3 02:21:41 localhost ovs-vsctl[23288]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Dec 3 02:21:41 localhost kernel: device vlan21 entered promiscuous mode Dec 3 02:21:41 localhost NetworkManager[5961]: [1764746501.0396] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Dec 3 02:21:41 localhost systemd-udevd[23290]: Network interface NamePolicy= disabled on kernel command line. Dec 3 02:21:41 localhost NetworkManager[5961]: [1764746501.0626] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23300 uid=0 result="success" Dec 3 02:21:41 localhost NetworkManager[5961]: [1764746501.0834] device (vlan21): carrier: link connected Dec 3 02:21:43 localhost sshd[23321]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.1378] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23332 uid=0 result="success" Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.1883] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23347 uid=0 result="success" Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.2536] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23368 uid=0 result="success" Dec 3 02:21:44 localhost ifup[23369]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:44 localhost ifup[23370]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:44 localhost ifup[23371]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.2873] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23377 uid=0 result="success" Dec 3 02:21:44 localhost ovs-vsctl[23380]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Dec 3 02:21:44 localhost NetworkManager[5961]: [1764746504.3884] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23387 uid=0 result="success" Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.4591] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23414 uid=0 result="success" Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.5102] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23429 uid=0 result="success" Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.5762] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23450 uid=0 result="success" Dec 3 02:21:45 localhost ifup[23451]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:45 localhost ifup[23452]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:45 localhost ifup[23453]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.6119] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23459 uid=0 result="success" Dec 3 02:21:45 localhost ovs-vsctl[23462]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Dec 3 02:21:45 localhost NetworkManager[5961]: [1764746505.7098] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23469 uid=0 result="success" Dec 3 02:21:46 localhost sshd[23488]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:21:46 localhost sshd[23490]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.7777] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23500 uid=0 result="success" Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.8103] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23515 uid=0 result="success" Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.8624] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23537 uid=0 result="success" Dec 3 02:21:46 localhost ifup[23538]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:46 localhost ifup[23539]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:46 localhost ifup[23540]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.8956] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23546 uid=0 result="success" Dec 3 02:21:46 localhost ovs-vsctl[23549]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Dec 3 02:21:46 localhost NetworkManager[5961]: [1764746506.9434] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23556 uid=0 result="success" Dec 3 02:21:47 localhost sshd[23575]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:21:47 localhost NetworkManager[5961]: [1764746507.9912] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23586 uid=0 result="success" Dec 3 02:21:48 localhost NetworkManager[5961]: [1764746508.0340] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23601 uid=0 result="success" Dec 3 02:21:48 localhost NetworkManager[5961]: [1764746508.0930] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23622 uid=0 result="success" Dec 3 02:21:48 localhost ifup[23623]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:48 localhost ifup[23624]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:48 localhost ifup[23625]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:48 localhost NetworkManager[5961]: [1764746508.1267] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23631 uid=0 result="success" Dec 3 02:21:48 localhost ovs-vsctl[23634]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Dec 3 02:21:48 localhost NetworkManager[5961]: [1764746508.1874] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23641 uid=0 result="success" Dec 3 02:21:48 localhost sshd[23659]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:21:49 localhost sshd[23662]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.2563] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23673 uid=0 result="success" Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.3051] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23688 uid=0 result="success" Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.3584] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23709 uid=0 result="success" Dec 3 02:21:49 localhost ifup[23710]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Dec 3 02:21:49 localhost ifup[23711]: 'network-scripts' will be removed from distribution in near future. Dec 3 02:21:49 localhost ifup[23712]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.3880] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23718 uid=0 result="success" Dec 3 02:21:49 localhost ovs-vsctl[23721]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Dec 3 02:21:49 localhost NetworkManager[5961]: [1764746509.4413] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23728 uid=0 result="success" Dec 3 02:21:50 localhost sshd[23747]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:21:50 localhost NetworkManager[5961]: [1764746510.4950] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23757 uid=0 result="success" Dec 3 02:21:50 localhost NetworkManager[5961]: [1764746510.5398] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23772 uid=0 result="success" Dec 3 02:21:50 localhost sshd[23774]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:21:51 localhost sshd[23792]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:21:53 localhost sshd[23795]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:22:50 localhost systemd[1]: session-10.scope: Deactivated successfully. Dec 3 02:22:50 localhost systemd[1]: session-10.scope: Consumed 1min 43.254s CPU time. Dec 3 02:22:50 localhost systemd-logind[764]: Session 10 logged out. Waiting for processes to exit. Dec 3 02:22:50 localhost systemd-logind[764]: Removed session 10. Dec 3 02:22:52 localhost sshd[23798]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:22:52 localhost systemd-logind[764]: New session 11 of user zuul. Dec 3 02:22:52 localhost systemd[1]: Started Session 11 of User zuul. Dec 3 02:22:52 localhost python3[23815]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-00000000001b-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:23:09 localhost python3[23834]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:10 localhost python3[23850]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:11 localhost python3[23864]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:12 localhost python3[23880]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Dec 3 02:23:13 localhost python3[23894]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Dec 3 02:23:13 localhost python3[23909]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005543227.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000022-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:23:24 localhost python3[23929]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-f989-2b4d-000000000023-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:23:24 localhost systemd[1]: Starting Hostname Service... Dec 3 02:23:24 localhost systemd[1]: Started Hostname Service. Dec 3 02:23:24 localhost systemd-hostnamed[23933]: Hostname set to (static) Dec 3 02:23:24 localhost NetworkManager[5961]: [1764746604.6786] hostname: static hostname changed from "np0005543227.novalocal" to "np0005543227.ooo.test" Dec 3 02:23:24 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Dec 3 02:23:24 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Dec 3 02:23:34 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Dec 3 02:23:35 localhost systemd[1]: session-11.scope: Deactivated successfully. Dec 3 02:23:35 localhost systemd[1]: session-11.scope: Consumed 2.018s CPU time. Dec 3 02:23:35 localhost systemd-logind[764]: Session 11 logged out. Waiting for processes to exit. Dec 3 02:23:35 localhost systemd-logind[764]: Removed session 11. Dec 3 02:23:37 localhost sshd[23944]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:23:37 localhost systemd-logind[764]: New session 12 of user zuul. Dec 3 02:23:37 localhost systemd[1]: Started Session 12 of User zuul. Dec 3 02:23:38 localhost python3[23961]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Dec 3 02:23:40 localhost systemd[1]: session-12.scope: Deactivated successfully. Dec 3 02:23:40 localhost systemd-logind[764]: Session 12 logged out. Waiting for processes to exit. Dec 3 02:23:40 localhost systemd-logind[764]: Removed session 12. Dec 3 02:23:54 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 02:24:28 localhost sshd[23965]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:24:28 localhost systemd-logind[764]: New session 13 of user zuul. Dec 3 02:24:28 localhost systemd[1]: Started Session 13 of User zuul. Dec 3 02:24:28 localhost python3[23984]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:24:35 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:24:35 localhost dbus-broker-launch[18560]: Noticed file-system modification, trigger reload. Dec 3 02:24:35 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:24:35 localhost dbus-broker-launch[18560]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Dec 3 02:24:35 localhost dbus-broker-launch[18560]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Dec 3 02:24:35 localhost dbus-broker-launch[18560]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Dec 3 02:24:35 localhost systemd[1]: Reloading. Dec 3 02:24:35 localhost systemd-rc-local-generator[24079]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:24:35 localhost systemd-sysv-generator[24084]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:24:35 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:24:35 localhost systemd[1]: Starting dnf makecache... Dec 3 02:24:36 localhost dnf[24093]: Updating Subscription Management repositories. Dec 3 02:24:37 localhost dnf[24093]: Failed determining last makecache time. Dec 3 02:24:37 localhost dnf[24093]: Red Hat OpenStack Platform 17.1 for RHEL 9 x86_ 48 kB/s | 4.0 kB 00:00 Dec 3 02:24:38 localhost dnf[24093]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 48 kB/s | 4.1 kB 00:00 Dec 3 02:24:38 localhost dnf[24093]: Fast Datapath for RHEL 9 x86_64 (RPMs) 41 kB/s | 4.0 kB 00:00 Dec 3 02:24:38 localhost dnf[24093]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 47 kB/s | 4.1 kB 00:00 Dec 3 02:24:38 localhost dnf[24093]: Red Hat Enterprise Linux 9 for x86_64 - High Av 35 kB/s | 4.0 kB 00:00 Dec 3 02:24:38 localhost dnf[24093]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 45 kB/s | 4.5 kB 00:00 Dec 3 02:24:38 localhost dnf[24093]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 40 kB/s | 4.5 kB 00:00 Dec 3 02:24:39 localhost dnf[24093]: Metadata cache created. Dec 3 02:24:39 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Dec 3 02:24:39 localhost systemd[1]: Finished dnf makecache. Dec 3 02:24:39 localhost systemd[1]: dnf-makecache.service: Consumed 2.602s CPU time. Dec 3 02:24:44 localhost kernel: SELinux: Converting 540 SID table entries... Dec 3 02:24:44 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:24:44 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:24:44 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:24:44 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:24:44 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:24:44 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:24:44 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:24:45 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:24:45 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=5 res=1 Dec 3 02:24:45 localhost systemd[1]: Stopping OpenSSH server daemon... Dec 3 02:24:45 localhost systemd[1]: sshd.service: Deactivated successfully. Dec 3 02:24:45 localhost systemd[1]: Stopped OpenSSH server daemon. Dec 3 02:24:45 localhost systemd[1]: sshd.service: Consumed 2.093s CPU time. Dec 3 02:24:45 localhost systemd[1]: Stopped target sshd-keygen.target. Dec 3 02:24:45 localhost systemd[1]: Stopping sshd-keygen.target... Dec 3 02:24:45 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 02:24:45 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 02:24:45 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 02:24:45 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 02:24:45 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 02:24:45 localhost sshd[24129]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:24:45 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 02:24:46 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:24:46 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:24:46 localhost systemd[1]: Reloading. Dec 3 02:24:47 localhost systemd-sysv-generator[24665]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:24:47 localhost systemd-rc-local-generator[24659]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:24:47 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:24:47 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:24:47 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:24:48 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:24:48 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:24:48 localhost systemd[1]: man-db-cache-update.service: Consumed 1.573s CPU time. Dec 3 02:24:48 localhost systemd[1]: run-r8cb88d6e079a4aae8300754258e665e3.service: Deactivated successfully. Dec 3 02:24:48 localhost systemd[1]: run-rfe64adee9a1a414aa45d018e8b3ce287.service: Deactivated successfully. Dec 3 02:25:48 localhost systemd[1]: session-13.scope: Deactivated successfully. Dec 3 02:25:48 localhost systemd[1]: session-13.scope: Consumed 17.590s CPU time. Dec 3 02:25:48 localhost systemd-logind[764]: Session 13 logged out. Waiting for processes to exit. Dec 3 02:25:48 localhost systemd-logind[764]: Removed session 13. Dec 3 02:26:15 localhost sshd[26094]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:26:15 localhost systemd-logind[764]: New session 14 of user zuul. Dec 3 02:26:15 localhost systemd[1]: Started Session 14 of User zuul. Dec 3 02:26:16 localhost python3[26145]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:26:16 localhost python3[26190]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1764746775.8904915-62-199493339799427/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:26:20 localhost python3[26220]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:26:22 localhost python3[26238]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:27:22 localhost systemd[1]: session-14.scope: Deactivated successfully. Dec 3 02:27:22 localhost systemd[1]: session-14.scope: Consumed 1.089s CPU time. Dec 3 02:27:22 localhost systemd-logind[764]: Session 14 logged out. Waiting for processes to exit. Dec 3 02:27:22 localhost systemd-logind[764]: Removed session 14. Dec 3 02:37:35 localhost sshd[26244]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:50:27 localhost sshd[26247]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:50:57 localhost sshd[26248]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:50:59 localhost sshd[26250]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:51:00 localhost sshd[26252]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:51:01 localhost sshd[26254]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:51:03 localhost sshd[26256]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:09 localhost sshd[26261]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:11 localhost sshd[26263]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:13 localhost sshd[26265]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:15 localhost sshd[26267]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:16 localhost sshd[26270]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:53 localhost sshd[26272]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:55 localhost sshd[26274]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:56 localhost sshd[26276]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:57 localhost sshd[26278]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:53:59 localhost sshd[26280]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:38 localhost sshd[26282]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:38 localhost systemd-logind[764]: New session 15 of user zuul. Dec 3 02:54:38 localhost systemd[1]: Started Session 15 of User zuul. Dec 3 02:54:38 localhost python3[26330]: ansible-ansible.legacy.ping Invoked with data=pong Dec 3 02:54:39 localhost python3[26375]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 02:54:40 localhost python3[26395]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005543227.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Dec 3 02:54:40 localhost systemd-journald[619]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Dec 3 02:54:40 localhost systemd-journald[619]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 02:54:40 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:54:40 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 02:54:41 localhost python3[26452]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:54:41 localhost python3[26495]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1764748480.7210908-81903-133706968471900/source _original_basename=tmp59lzc6xu follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:42 localhost python3[26525]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:42 localhost python3[26541]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:42 localhost python3[26557]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:43 localhost python3[26573]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa 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 zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:54:44 localhost python3[26587]: ansible-ping Invoked with data=pong Dec 3 02:54:55 localhost sshd[26589]: main: sshd: ssh-rsa algorithm is disabled Dec 3 02:54:55 localhost systemd-logind[764]: New session 16 of user tripleo-admin. Dec 3 02:54:55 localhost systemd[1]: Created slice User Slice of UID 1002. Dec 3 02:54:55 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Dec 3 02:54:55 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Dec 3 02:54:55 localhost systemd[1]: Starting User Manager for UID 1002... Dec 3 02:54:55 localhost systemd[26593]: Queued start job for default target Main User Target. Dec 3 02:54:55 localhost systemd[26593]: Created slice User Application Slice. Dec 3 02:54:55 localhost systemd[26593]: Started Mark boot as successful after the user session has run 2 minutes. Dec 3 02:54:55 localhost systemd[26593]: Started Daily Cleanup of User's Temporary Directories. Dec 3 02:54:55 localhost systemd[26593]: Reached target Paths. Dec 3 02:54:55 localhost systemd[26593]: Reached target Timers. Dec 3 02:54:55 localhost systemd[26593]: Starting D-Bus User Message Bus Socket... Dec 3 02:54:55 localhost systemd[26593]: Starting Create User's Volatile Files and Directories... Dec 3 02:54:55 localhost systemd[26593]: Finished Create User's Volatile Files and Directories. Dec 3 02:54:55 localhost systemd[26593]: Listening on D-Bus User Message Bus Socket. Dec 3 02:54:55 localhost systemd[26593]: Reached target Sockets. Dec 3 02:54:55 localhost systemd[26593]: Reached target Basic System. Dec 3 02:54:55 localhost systemd[26593]: Reached target Main User Target. Dec 3 02:54:55 localhost systemd[26593]: Startup finished in 114ms. Dec 3 02:54:55 localhost systemd[1]: Started User Manager for UID 1002. Dec 3 02:54:55 localhost systemd[1]: Started Session 16 of User tripleo-admin. Dec 3 02:54:56 localhost python3[26654]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Dec 3 02:55:00 localhost python3[26674]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Dec 3 02:55:01 localhost python3[26690]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Dec 3 02:55:02 localhost python3[26738]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.gwk1uk64tmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:02 localhost python3[26768]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.gwk1uk64tmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:03 localhost python3[26784]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.gwk1uk64tmphosts insertbefore=BOF block=172.17.0.106 np0005543228.ooo.test np0005543228#012172.18.0.106 np0005543228.storage.ooo.test np0005543228.storage#012172.17.0.106 np0005543228.internalapi.ooo.test np0005543228.internalapi#012172.19.0.106 np0005543228.tenant.ooo.test np0005543228.tenant#012192.168.122.106 np0005543228.ctlplane.ooo.test np0005543228.ctlplane#012172.17.0.107 np0005543230.ooo.test np0005543230#012172.18.0.107 np0005543230.storage.ooo.test np0005543230.storage#012172.17.0.107 np0005543230.internalapi.ooo.test np0005543230.internalapi#012172.19.0.107 np0005543230.tenant.ooo.test np0005543230.tenant#012192.168.122.107 np0005543230.ctlplane.ooo.test np0005543230.ctlplane#012172.17.0.108 np0005543231.ooo.test np0005543231#012172.18.0.108 np0005543231.storage.ooo.test np0005543231.storage#012172.17.0.108 np0005543231.internalapi.ooo.test np0005543231.internalapi#012172.19.0.108 np0005543231.tenant.ooo.test np0005543231.tenant#012192.168.122.108 np0005543231.ctlplane.ooo.test np0005543231.ctlplane#012172.17.0.103 np0005543225.ooo.test np0005543225#012172.18.0.103 np0005543225.storage.ooo.test np0005543225.storage#012172.20.0.103 np0005543225.storagemgmt.ooo.test np0005543225.storagemgmt#012172.17.0.103 np0005543225.internalapi.ooo.test np0005543225.internalapi#012172.19.0.103 np0005543225.tenant.ooo.test np0005543225.tenant#012172.21.0.103 np0005543225.external.ooo.test np0005543225.external#012192.168.122.103 np0005543225.ctlplane.ooo.test np0005543225.ctlplane#012172.17.0.104 np0005543226.ooo.test np0005543226#012172.18.0.104 np0005543226.storage.ooo.test np0005543226.storage#012172.20.0.104 np0005543226.storagemgmt.ooo.test np0005543226.storagemgmt#012172.17.0.104 np0005543226.internalapi.ooo.test np0005543226.internalapi#012172.19.0.104 np0005543226.tenant.ooo.test np0005543226.tenant#012172.21.0.104 np0005543226.external.ooo.test np0005543226.external#012192.168.122.104 np0005543226.ctlplane.ooo.test np0005543226.ctlplane#012172.17.0.105 np0005543227.ooo.test np0005543227#012172.18.0.105 np0005543227.storage.ooo.test np0005543227.storage#012172.20.0.105 np0005543227.storagemgmt.ooo.test np0005543227.storagemgmt#012172.17.0.105 np0005543227.internalapi.ooo.test np0005543227.internalapi#012172.19.0.105 np0005543227.tenant.ooo.test np0005543227.tenant#012172.21.0.105 np0005543227.external.ooo.test np0005543227.external#012192.168.122.105 np0005543227.ctlplane.ooo.test np0005543227.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.166 overcloud.storage.ooo.test#012172.20.0.188 overcloud.storagemgmt.ooo.test#012172.17.0.147 overcloud.internalapi.ooo.test#012172.21.0.122 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:04 localhost python3[26800]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.gwk1uk64tmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:55:04 localhost python3[26817]: ansible-file Invoked with path=/tmp/ansible.gwk1uk64tmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:55:05 localhost python3[26833]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:55:07 localhost python3[26850]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:55:12 localhost python3[26869]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:55:12 localhost python3[26886]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:55:24 localhost systemd[1]: Reloading. Dec 3 02:55:24 localhost systemd-sysv-generator[27083]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:55:24 localhost systemd-rc-local-generator[27079]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:55:24 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:55:24 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Dec 3 02:55:32 localhost systemd[1]: Reloading. Dec 3 02:55:32 localhost systemd-rc-local-generator[27151]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:55:32 localhost systemd-sysv-generator[27156]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:55:33 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:55:33 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Dec 3 02:55:33 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Dec 3 02:55:33 localhost systemd[1]: Reloading. Dec 3 02:55:33 localhost systemd-sysv-generator[27194]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:55:33 localhost systemd-rc-local-generator[27190]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:55:33 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:55:33 localhost systemd[1]: Listening on LVM2 poll daemon socket. Dec 3 02:56:21 localhost kernel: SELinux: Converting 2713 SID table entries... Dec 3 02:56:21 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:56:21 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:56:21 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:56:21 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:56:21 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:56:21 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:56:21 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:56:22 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=7 res=1 Dec 3 02:56:22 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:22 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:56:22 localhost systemd[1]: Reloading. Dec 3 02:56:22 localhost systemd-rc-local-generator[27838]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:56:22 localhost systemd-sysv-generator[27841]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:56:22 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:56:22 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:56:22 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:23 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:56:23 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:56:23 localhost systemd[1]: run-r054f8ca71d0b45baa26a44eaa1e9cc98.service: Deactivated successfully. Dec 3 02:56:23 localhost systemd[1]: run-rcec5917894a548e5afb252388d241214.service: Deactivated successfully. Dec 3 02:56:26 localhost python3[28713]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:27 localhost python3[28852]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:56:27 localhost systemd[1]: Reloading. Dec 3 02:56:27 localhost systemd-rc-local-generator[28882]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:56:27 localhost systemd-sysv-generator[28886]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:56:27 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:56:29 localhost python3[28906]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:29 localhost python3[28922]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:30 localhost python3[28939]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Dec 3 02:56:31 localhost python3[28957]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:32 localhost python3[28975]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:32 localhost python3[28993]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:56:32 localhost systemd[1]: Reloading Network Manager... Dec 3 02:56:32 localhost NetworkManager[5961]: [1764748592.9710] audit: op="reload" arg="0" pid=28996 uid=0 result="success" Dec 3 02:56:32 localhost NetworkManager[5961]: [1764748592.9718] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Dec 3 02:56:32 localhost NetworkManager[5961]: [1764748592.9719] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Dec 3 02:56:32 localhost systemd[1]: Reloaded Network Manager. Dec 3 02:56:33 localhost python3[29012]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:33 localhost python3[29029]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:34 localhost python3[29047]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:34 localhost python3[29063]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:35 localhost python3[29079]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Dec 3 02:56:35 localhost python3[29095]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:36 localhost python3[29111]: ansible-blockinfile Invoked with path=/tmp/ansible.i4wfzzfi block=[192.168.122.106]*,[np0005543228.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005543228.internalapi.ooo.test]*,[172.18.0.106]*,[np0005543228.storage.ooo.test]*,[172.19.0.106]*,[np0005543228.tenant.ooo.test]*,[np0005543228.ooo.test]*,[np0005543228]* ssh-rsa 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#012[192.168.122.107]*,[np0005543230.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005543230.internalapi.ooo.test]*,[172.18.0.107]*,[np0005543230.storage.ooo.test]*,[172.19.0.107]*,[np0005543230.tenant.ooo.test]*,[np0005543230.ooo.test]*,[np0005543230]* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCRsH3IT/sKgeuPQr39BU9hRDYEM7MDHUckWDTNoUIaOaX5HumAgLJOKrFnoXmvJEK9s17oxQQ0EuXE0gviIM3oYoylTR+CYqaUNxg3t/iq8DGz4dvK2KgoQjqUIWGkZGc516qaM9up+kDFYU51uU8sOQjv2Bl1cnFGhuhA3fCaqKddXEzJpbF3lLN7+60SV1C98lEjtTuWobtLJpF4lZpSxPbQqOR+cM2px8MVEmFCTfevQHJvYOyMN+6Gf+4M55HAGxStjyMYBGrSrpA2RnFeQYt3On069gARaPsNxmlJjjAPp1ilSXzNBsxeybnmfNNcGUM7sb0SQg3Ktm4bvskg80zev0/buhtRI11i5YxpC7rBC5dfvfkecwEz3OeS38LTNUlou8v5CB7lD2RM/BGwlrw+7AFbKml/mYiqoEWahGaBW+0VCfLtMr8CKyC4Q3T1KHBQCJ7dVDLE7PT+N+yPzkKXByaxipii8pqdvKx3MZA3+75+QtjZ4sGW9K23+rc=#012[192.168.122.108]*,[np0005543231.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005543231.internalapi.ooo.test]*,[172.18.0.108]*,[np0005543231.storage.ooo.test]*,[172.19.0.108]*,[np0005543231.tenant.ooo.test]*,[np0005543231.ooo.test]*,[np0005543231]* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCYfgWbD1+Ukq1QdHPbEviT6rPT4yo1WbvdHKQQj1mNxGL/5tBxb/RsPtlPDMamSx6herk/OzSA2DWZz9+iF7y1sA2q40tf9FMJ16ym56E1DmSVnaMdRxNcx+IKMOyiWqbq92sC7feHLFydVCEim5mJn8PmRVHYpfaHeZmO82CmUnGjzekYAFa2vLwzfCUKxHzVj2xttzMeBHxxo6YdvuQS+UYiPSF+st2bXdOHH9B7TEtz6oo3OdPHe/LBMWnzp5PghokOt3NwsqFSaRTao/ETUI1hbc+MAP9P3h6F6bkJFUMHMpHLaHv9E5neLwQzDRm6g82yR4vvk4IfEDjyvm3MfPe5WgtTJCNaj6Z1uKxj0jrHAJyj0xasp6PlSpsqSEY/s/ahpW8y44lyHsJmyNvD3YXiG7W+DYN0EjulIHYRMEwAwaOBNFvzQfJbN/kgKXz0S8z8jB6YLLw0xYGDUhJGEmAPdSSdfV/OKJNtKPSxBNcCYrwfl1p8WzT/JVYzytc=#012[192.168.122.103]*,[np0005543225.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005543225.external.ooo.test]*,[172.17.0.103]*,[np0005543225.internalapi.ooo.test]*,[172.18.0.103]*,[np0005543225.storage.ooo.test]*,[172.20.0.103]*,[np0005543225.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005543225.tenant.ooo.test]*,[np0005543225.ooo.test]*,[np0005543225]* ssh-rsa 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#012[192.168.122.104]*,[np0005543226.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005543226.external.ooo.test]*,[172.17.0.104]*,[np0005543226.internalapi.ooo.test]*,[172.18.0.104]*,[np0005543226.storage.ooo.test]*,[172.20.0.104]*,[np0005543226.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005543226.tenant.ooo.test]*,[np0005543226.ooo.test]*,[np0005543226]* ssh-rsa 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#012[192.168.122.105]*,[np0005543227.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005543227.external.ooo.test]*,[172.17.0.105]*,[np0005543227.internalapi.ooo.test]*,[172.18.0.105]*,[np0005543227.storage.ooo.test]*,[172.20.0.105]*,[np0005543227.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005543227.tenant.ooo.test]*,[np0005543227.ooo.test]*,[np0005543227]* ssh-rsa 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#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:37 localhost python3[29127]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.i4wfzzfi' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:37 localhost python3[29145]: ansible-file Invoked with path=/tmp/ansible.i4wfzzfi state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:56:38 localhost python3[29161]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Dec 3 02:56:38 localhost python3[29177]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:39 localhost python3[29195]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:39 localhost python3[29214]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Dec 3 02:56:42 localhost python3[29351]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:42 localhost python3[29368]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:56:45 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:56:45 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:56:45 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 02:56:46 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:46 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:56:46 localhost systemd[1]: Reloading. Dec 3 02:56:46 localhost systemd-sysv-generator[29436]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:56:46 localhost systemd-rc-local-generator[29428]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:56:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:56:46 localhost systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 02:56:46 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Dec 3 02:56:46 localhost systemd[1]: tuned.service: Deactivated successfully. Dec 3 02:56:46 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Dec 3 02:56:46 localhost systemd[1]: tuned.service: Consumed 1.860s CPU time. Dec 3 02:56:46 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Dec 3 02:56:46 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:56:46 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:56:46 localhost systemd[1]: run-r6734a9d9ac9043bc910c8be7f6222a59.service: Deactivated successfully. Dec 3 02:56:47 localhost systemd[1]: Started Dynamic System Tuning Daemon. Dec 3 02:56:47 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 02:56:47 localhost systemd[1]: Starting man-db-cache-update.service... Dec 3 02:56:48 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 02:56:48 localhost systemd[1]: Finished man-db-cache-update.service. Dec 3 02:56:48 localhost systemd[1]: run-r39f07b6109084fa281e759ed4b348d31.service: Deactivated successfully. Dec 3 02:56:49 localhost python3[29813]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:56:49 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Dec 3 02:56:49 localhost systemd[1]: tuned.service: Deactivated successfully. Dec 3 02:56:49 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Dec 3 02:56:49 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Dec 3 02:56:50 localhost systemd[1]: Started Dynamic System Tuning Daemon. Dec 3 02:56:50 localhost python3[30010]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:51 localhost python3[30027]: ansible-slurp Invoked with src=/etc/tuned/active_profile Dec 3 02:56:51 localhost python3[30043]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:52 localhost python3[30059]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:53 localhost python3[30079]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:56:54 localhost python3[30096]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:56:57 localhost python3[30112]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:01 localhost python3[30128]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:02 localhost python3[30176]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:02 localhost python3[30221]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748621.8880038-87391-245249904262907/source _original_basename=tmpw02mrz_l follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:03 localhost python3[30251]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:03 localhost python3[30299]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:04 localhost python3[30342]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748623.5035143-87583-111532260947833/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=0b8212f4500c40b31ba4dd459c2695d956264369 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:04 localhost python3[30404]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:05 localhost python3[30447]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748624.4912553-87811-241453243241386/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=2c29b36a1551bdd104ca7b81ba27c00dedb68297 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:05 localhost python3[30509]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:06 localhost python3[30552]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748625.492109-87811-144123294469431/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=2093b47eb1119a802673002321e960c01a008d59 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:07 localhost python3[30614]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:07 localhost python3[30657]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748626.494162-87811-25237582489576/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=67dce5a9d3e5afcc493ab8a2bfd1b7dcebd64331 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:08 localhost python3[30719]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:08 localhost python3[30762]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748627.7023683-87811-105132943143762/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:09 localhost python3[30824]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:09 localhost python3[30867]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748628.6489928-87811-21678136970160/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=2dd7a3debe5d20bc2ff035baa029d7bed87dda07 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:09 localhost python3[30929]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:10 localhost python3[30972]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748629.6408525-87811-153528386367633/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:10 localhost python3[31034]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:11 localhost python3[31077]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748630.591133-87811-125337112901394/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=0c921408d3f2ea7e82fbc791b96f093196f1f642 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:11 localhost python3[31139]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:12 localhost python3[31182]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748631.5895681-87811-37719113673926/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:12 localhost python3[31244]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:13 localhost python3[31287]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748632.5588005-87811-218125118759130/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:13 localhost python3[31349]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:14 localhost python3[31392]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748633.5745647-87811-5760606213201/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=79f84c1fa121c4ce5ae9c71b4c79799c3b5febe7 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:15 localhost python3[31422]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:57:15 localhost python3[31470]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:57:16 localhost python3[31513]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748635.4589381-89218-121568154204148/source _original_basename=tmpxuamvvi1 follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:57:21 localhost python3[31543]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Dec 3 02:57:21 localhost python3[31604]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:23 localhost systemd[26593]: Starting Mark boot as successful... Dec 3 02:57:23 localhost systemd[26593]: Finished Mark boot as successful. Dec 3 02:57:26 localhost python3[31622]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:31 localhost python3[31639]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:31 localhost python3[31662]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:36 localhost python3[31680]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:36 localhost python3[31703]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:41 localhost python3[31720]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.18.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:45 localhost python3[31737]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:46 localhost python3[31760]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:50 localhost python3[31777]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.20.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:55 localhost python3[31794]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:57:55 localhost python3[31817]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:00 localhost python3[31834]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.17.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:04 localhost python3[31851]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:05 localhost python3[31874]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:09 localhost python3[31891]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.19.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:13 localhost python3[31908]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:14 localhost python3[31931]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:18 localhost python3[31948]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -s 1472 -c 5 172.21.0.103 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:24 localhost python3[31965]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:24 localhost python3[32013]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:25 localhost python3[32031]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmp7oe2_zhe recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:25 localhost python3[32061]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:26 localhost python3[32109]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:26 localhost python3[32127]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:27 localhost python3[32189]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:27 localhost python3[32207]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:27 localhost python3[32269]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:28 localhost python3[32287]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:28 localhost python3[32349]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:29 localhost python3[32367]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:29 localhost python3[32429]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:30 localhost python3[32447]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:30 localhost python3[32509]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:30 localhost python3[32527]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:31 localhost python3[32589]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:31 localhost python3[32607]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:32 localhost python3[32669]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:32 localhost python3[32687]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:33 localhost python3[32749]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:33 localhost python3[32767]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:33 localhost python3[32829]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:34 localhost python3[32847]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:34 localhost python3[32909]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:34 localhost python3[32927]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:35 localhost python3[32957]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:58:36 localhost python3[33005]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:36 localhost python3[33023]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmpybtq1_b9 recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:39 localhost python3[33053]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:58:43 localhost python3[33070]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:58:44 localhost python3[33088]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:58:44 localhost python3[33106]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 02:58:45 localhost systemd[1]: Reloading. Dec 3 02:58:46 localhost systemd-sysv-generator[33136]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:58:46 localhost systemd-rc-local-generator[33132]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:58:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:58:46 localhost systemd[1]: Starting Netfilter Tables... Dec 3 02:58:46 localhost systemd[1]: Finished Netfilter Tables. Dec 3 02:58:46 localhost python3[33196]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:47 localhost python3[33239]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748726.6318681-93444-499980569596/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:47 localhost python3[33269]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:48 localhost python3[33287]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:48 localhost python3[33336]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:49 localhost python3[33379]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748728.5546973-93746-97393731103167/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:50 localhost python3[33441]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:50 localhost python3[33484]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748729.6313508-94019-100360248225081/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:51 localhost python3[33546]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:51 localhost python3[33589]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748730.6837058-94173-172556332749479/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:52 localhost python3[33651]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:52 localhost python3[33694]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748731.6619895-94297-93731100426596/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:54 localhost python3[33756]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:58:54 localhost python3[33799]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748732.6493218-94419-146673204188435/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:54 localhost python3[33829]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:55 localhost python3[33894]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:58:56 localhost python3[33911]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:56 localhost python3[33928]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:58:56 localhost python3[33947]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:58:57 localhost python3[33963]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Dec 3 02:58:58 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=8 res=1 Dec 3 02:58:58 localhost python3[33984]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:58:58 localhost python3[34000]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:58:59 localhost python3[34016]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:58:59 localhost kernel: SELinux: Converting 2717 SID table entries... Dec 3 02:58:59 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:58:59 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:58:59 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:58:59 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:58:59 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:58:59 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:58:59 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:00 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=9 res=1 Dec 3 02:59:00 localhost python3[34037]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:00 localhost python3[34053]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:01 localhost python3[34069]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:01 localhost python3[34085]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:02 localhost python3[34101]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:59:05 localhost python3[34118]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Dec 3 02:59:05 localhost python3[34135]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Dec 3 02:59:05 localhost kernel: loop: module loaded Dec 3 02:59:05 localhost kernel: loop0: detected capacity change from 0 to 41943040 Dec 3 02:59:06 localhost python3[34160]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Dec 3 02:59:06 localhost lvm[34164]: PV /dev/loop0 not used. Dec 3 02:59:06 localhost lvm[34166]: PV /dev/loop0 online, VG cinder-volumes is complete. Dec 3 02:59:06 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Dec 3 02:59:06 localhost lvm[34168]: 0 logical volume(s) in volume group "cinder-volumes" now active Dec 3 02:59:06 localhost systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Dec 3 02:59:07 localhost python3[34216]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:07 localhost python3[34259]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748746.6719165-95195-123320080113680/source _original_basename=tmpzbeumxni follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:07 localhost python3[34289]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Dec 3 02:59:07 localhost systemd[1]: Reloading. Dec 3 02:59:08 localhost systemd-sysv-generator[34318]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:59:08 localhost systemd-rc-local-generator[34312]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:59:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:59:08 localhost systemd[1]: Reloading. Dec 3 02:59:08 localhost systemd-sysv-generator[34353]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:59:08 localhost systemd-rc-local-generator[34349]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:59:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:59:08 localhost python3[34379]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:09 localhost python3[34395]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:09 localhost python3[34411]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:10 localhost python3[34427]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:10 localhost python3[34443]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:10 localhost python3[34459]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:11 localhost python3[34475]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:16 localhost python3[34621]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:17 localhost python3[34637]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:17 localhost python3[34653]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:17 localhost python3[34669]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:18 localhost python3[34685]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:18 localhost python3[34701]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:18 localhost python3[34717]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34733]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34749]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:19 localhost python3[34797]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:20 localhost python3[34840]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748759.5028777-96196-219581467596114/source _original_basename=tmp3uuuj2kq follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:20 localhost python3[34870]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:21 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:21 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:21 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:21 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:21 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:21 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:21 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:21 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:21 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=10 res=1 Dec 3 02:59:22 localhost python3[34891]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:22 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:22 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:22 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:22 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:23 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=11 res=1 Dec 3 02:59:23 localhost python3[34912]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:24 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:24 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:24 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:24 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:24 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=12 res=1 Dec 3 02:59:24 localhost python3[34933]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:25 localhost python3[34949]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:25 localhost python3[34965]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:25 localhost python3[34981]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:26 localhost python3[34997]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:59:26 localhost python3[35014]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 02:59:31 localhost python3[35031]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:31 localhost python3[35079]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:32 localhost python3[35122]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748771.4436977-97160-53944781583517/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:32 localhost python3[35152]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:59:32 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 3 02:59:32 localhost systemd[1]: Stopped Load Kernel Modules. Dec 3 02:59:32 localhost systemd[1]: Stopping Load Kernel Modules... Dec 3 02:59:32 localhost systemd[1]: Starting Load Kernel Modules... Dec 3 02:59:32 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 3 02:59:32 localhost kernel: Bridge firewalling registered Dec 3 02:59:32 localhost systemd-modules-load[35155]: Inserted module 'br_netfilter' Dec 3 02:59:32 localhost systemd-modules-load[35155]: Module 'msr' is built in Dec 3 02:59:32 localhost systemd[1]: Finished Load Kernel Modules. Dec 3 02:59:33 localhost python3[35206]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:33 localhost python3[35249]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748772.983459-97259-145525847133606/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:34 localhost python3[35279]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:34 localhost python3[35297]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:34 localhost python3[35315]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:35 localhost python3[35332]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:35 localhost python3[35349]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:35 localhost python3[35366]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:36 localhost python3[35384]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:36 localhost python3[35402]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:36 localhost python3[35420]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:37 localhost python3[35438]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:37 localhost python3[35456]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:37 localhost python3[35474]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:38 localhost python3[35492]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:38 localhost python3[35509]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:38 localhost python3[35526]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:39 localhost python3[35543]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:39 localhost python3[35560]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Dec 3 02:59:39 localhost python3[35578]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:59:39 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 3 02:59:39 localhost systemd[1]: Stopped Apply Kernel Variables. Dec 3 02:59:39 localhost systemd[1]: Stopping Apply Kernel Variables... Dec 3 02:59:39 localhost systemd[1]: Starting Apply Kernel Variables... Dec 3 02:59:39 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 3 02:59:39 localhost systemd[1]: Finished Apply Kernel Variables. Dec 3 02:59:40 localhost python3[35598]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:40 localhost python3[35614]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:41 localhost python3[35630]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:41 localhost python3[35646]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:41 localhost python3[35662]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 02:59:42 localhost python3[35678]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:42 localhost python3[35694]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:42 localhost python3[35710]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:43 localhost python3[35726]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:43 localhost python3[35742]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:43 localhost python3[35758]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:44 localhost python3[35774]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:44 localhost python3[35790]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:44 localhost python3[35806]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:45 localhost python3[35822]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:45 localhost python3[35838]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:45 localhost python3[35854]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost python3[35870]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost python3[35886]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:46 localhost python3[35902]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:47 localhost python3[35918]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:47 localhost python3[35934]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:47 localhost python3[35950]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:48 localhost python3[35966]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Dec 3 02:59:48 localhost python3[35988]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005543227.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Dec 3 02:59:49 localhost python3[36012]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Dec 3 02:59:49 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=13 res=1 Dec 3 02:59:50 localhost python3[36033]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:50 localhost python3[36049]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:50 localhost python3[36065]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:51 localhost python3[36081]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:51 localhost python3[36129]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:52 localhost python3[36172]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748791.2322805-98909-137309069822892/source _original_basename=tmpyt6ryqfg follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:52 localhost python3[36234]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 02:59:53 localhost python3[36277]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748792.2494056-99019-252494574185766/source _original_basename=tmpmwh5o31o follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:53 localhost python3[36307]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Dec 3 02:59:53 localhost systemd[1]: Reloading. Dec 3 02:59:53 localhost systemd-rc-local-generator[36333]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 02:59:53 localhost systemd-sysv-generator[36341]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 02:59:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 02:59:54 localhost python3[36361]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:54 localhost python3[36377]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 02:59:55 localhost python3[36393]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 02:59:55 localhost systemd[1]: Stopping User Login Management... Dec 3 02:59:55 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Dec 3 02:59:55 localhost systemd[1]: Stopped User Login Management. Dec 3 02:59:55 localhost systemd[1]: Starting Load Kernel Module drm... Dec 3 02:59:55 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 3 02:59:55 localhost systemd[1]: Finished Load Kernel Module drm. Dec 3 02:59:55 localhost systemd[1]: Starting User Login Management... Dec 3 02:59:55 localhost systemd-logind[36401]: New seat seat0. Dec 3 02:59:55 localhost systemd-logind[36401]: Watching system buttons on /dev/input/event0 (Power Button) Dec 3 02:59:55 localhost systemd-logind[36401]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 3 02:59:55 localhost systemd[1]: Started User Login Management. Dec 3 02:59:55 localhost systemd-logind[36401]: New session 15 of user zuul. Dec 3 02:59:55 localhost systemd-logind[36401]: New session 16 of user tripleo-admin. Dec 3 02:59:55 localhost python3[36417]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:56 localhost python3[36433]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:56 localhost python3[36449]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 02:59:57 localhost kernel: SELinux: Converting 2721 SID table entries... Dec 3 02:59:57 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 02:59:57 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 02:59:57 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 02:59:57 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=14 res=1 Dec 3 02:59:57 localhost python3[36477]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:58 localhost python3[36493]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 02:59:58 localhost python3[36509]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 02:59:59 localhost python3[36527]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:00:02 localhost python3[36544]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Dec 3 03:00:03 localhost python3[36605]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:03 localhost python3[36621]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:03 localhost systemd[26593]: Created slice User Background Tasks Slice. Dec 3 03:00:03 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:00:03 localhost systemd[26593]: Starting Cleanup of User's Temporary Files and Directories... Dec 3 03:00:03 localhost systemd[26593]: Finished Cleanup of User's Temporary Files and Directories. Dec 3 03:00:04 localhost python3[36681]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:04 localhost python3[36724]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748803.6128876-99661-105811100956699/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=14b2531878196cfb534edc8447262f46ca306a87 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:05 localhost python3[36786]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:05 localhost python3[36831]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748804.6975038-99728-233086010714754/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:06 localhost python3[36861]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:06 localhost python3[36877]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:06 localhost python3[36893]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:06 localhost python3[36909]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:07 localhost python3[36957]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:08 localhost python3[37000]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748807.2321124-99916-200819271322593/source _original_basename=tmpcynv_673 follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:08 localhost python3[37030]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:09 localhost python3[37046]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:09 localhost python3[37062]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:09 localhost python3[37110]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:10 localhost python3[37153]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748809.5594962-100126-261997533479437/source _original_basename=tmpmdpa3mto follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:10 localhost python3[37183]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:11 localhost python3[37199]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:11 localhost python3[37215]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:00:19 localhost python3[37264]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:20 localhost python3[37309]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748819.1617072-100772-281357490315541/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:20 localhost python3[37340]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:00:20 localhost systemd[1]: Stopping OpenSSH server daemon... Dec 3 03:00:20 localhost systemd[1]: sshd.service: Deactivated successfully. Dec 3 03:00:20 localhost systemd[1]: Stopped OpenSSH server daemon. Dec 3 03:00:20 localhost systemd[1]: Stopped target sshd-keygen.target. Dec 3 03:00:20 localhost systemd[1]: Stopping sshd-keygen.target... Dec 3 03:00:20 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:00:20 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:00:20 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:00:20 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 03:00:20 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 03:00:20 localhost sshd[37344]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:00:20 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 03:00:20 localhost python3[37360]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:21 localhost python3[37376]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:21 localhost python3[37392]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:21 localhost python3[37408]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:22 localhost python3[37424]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:22 localhost python3[37440]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:23 localhost python3[37456]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:23 localhost python3[37472]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:24 localhost python3[37490]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:25 localhost python3[37508]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:00:31 localhost python3[37557]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:32 localhost python3[37602]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748831.4965324-101428-9868703016162/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:33 localhost python3[37632]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:00:33 localhost python3[37650]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 03:00:34 localhost systemd[1]: Stopping NTP client/server... Dec 3 03:00:34 localhost chronyd[766]: chronyd exiting Dec 3 03:00:34 localhost systemd[1]: chronyd.service: Deactivated successfully. Dec 3 03:00:34 localhost systemd[1]: Stopped NTP client/server. Dec 3 03:00:34 localhost systemd[1]: chronyd.service: Consumed 148ms CPU time, read 1.9M from disk, written 4.0K to disk. Dec 3 03:00:34 localhost systemd[1]: Starting NTP client/server... Dec 3 03:00:34 localhost chronyd[37657]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Dec 3 03:00:34 localhost chronyd[37657]: Frequency -30.309 +/- 0.167 ppm read from /var/lib/chrony/drift Dec 3 03:00:34 localhost chronyd[37657]: Loaded seccomp filter (level 2) Dec 3 03:00:34 localhost systemd[1]: Started NTP client/server. Dec 3 03:00:35 localhost python3[37706]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:00:35 localhost python3[37749]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748835.005845-101622-132283518892552/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:36 localhost python3[37779]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:00:36 localhost systemd[1]: Reloading. Dec 3 03:00:36 localhost systemd-rc-local-generator[37802]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:00:36 localhost systemd-sysv-generator[37810]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:00:36 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:00:36 localhost systemd[1]: Reloading. Dec 3 03:00:36 localhost systemd-rc-local-generator[37844]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:00:36 localhost systemd-sysv-generator[37847]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:00:36 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:00:36 localhost systemd[1]: Starting chronyd online sources service... Dec 3 03:00:36 localhost chronyc[37855]: 200 OK Dec 3 03:00:36 localhost systemd[1]: chrony-online.service: Deactivated successfully. Dec 3 03:00:36 localhost systemd[1]: Finished chronyd online sources service. Dec 3 03:00:37 localhost python3[37872]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:37 localhost chronyd[37657]: System clock was stepped by 0.000000 seconds Dec 3 03:00:37 localhost python3[37889]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:38 localhost chronyd[37657]: Selected source 206.108.0.132 (pool.ntp.org) Dec 3 03:00:48 localhost python3[37906]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:48 localhost chronyd[37657]: System clock was stepped by -0.000004 seconds Dec 3 03:00:48 localhost python3[37923]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:48 localhost python3[37940]: ansible-timezone Invoked with name=UTC hwclock=None Dec 3 03:00:48 localhost systemd[1]: Starting Time & Date Service... Dec 3 03:00:49 localhost systemd[1]: Started Time & Date Service. Dec 3 03:00:50 localhost python3[37960]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:50 localhost python3[37977]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:00:51 localhost python3[37994]: ansible-slurp Invoked with src=/etc/tuned/active_profile Dec 3 03:00:51 localhost python3[38010]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 03:00:52 localhost python3[38026]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:53 localhost python3[38042]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Dec 3 03:00:53 localhost python3[38058]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:53 localhost python3[38074]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:54 localhost python3[38090]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:00:54 localhost python3[38106]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Dec 3 03:00:55 localhost kernel: SELinux: Converting 2723 SID table entries... Dec 3 03:00:55 localhost kernel: SELinux: policy capability network_peer_controls=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability open_perms=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability extended_socket_class=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability always_check_network=0 Dec 3 03:00:55 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 3 03:00:55 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Dec 3 03:00:55 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=15 res=1 Dec 3 03:00:55 localhost python3[38127]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 03:00:57 localhost python3[38264]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Dec 3 03:00:58 localhost rsyslogd[759]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Dec 3 03:00:58 localhost python3[38280]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:58 localhost python3[38296]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:00:59 localhost python3[38312]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Dec 3 03:00:59 localhost rsyslogd[759]: message too long (37323) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Dec 3 03:01:08 localhost python3[38339]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 03:01:10 localhost python3[38355]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005543227.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Dec 3 03:01:11 localhost python3[38377]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:12 localhost python3[38393]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Dec 3 03:01:12 localhost systemd[1]: Reloading. Dec 3 03:01:12 localhost systemd-rc-local-generator[38428]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:12 localhost systemd-sysv-generator[38431]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:12 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:12 localhost chronyd[37657]: chronyd exiting Dec 3 03:01:12 localhost systemd[1]: Stopping NTP client/server... Dec 3 03:01:12 localhost systemd[1]: chronyd.service: Deactivated successfully. Dec 3 03:01:12 localhost systemd[1]: Stopped NTP client/server. Dec 3 03:01:12 localhost systemd[1]: Starting NTP client/server... Dec 3 03:01:12 localhost chronyd[38443]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Dec 3 03:01:12 localhost chronyd[38443]: Frequency -30.309 +/- 0.176 ppm read from /var/lib/chrony/drift Dec 3 03:01:12 localhost chronyd[38443]: Loaded seccomp filter (level 2) Dec 3 03:01:12 localhost systemd[1]: Started NTP client/server. Dec 3 03:01:17 localhost chronyd[38443]: Selected source 23.133.168.246 (pool.ntp.org) Dec 3 03:01:19 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Dec 3 03:01:19 localhost python3[38464]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543227.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Dec 3 03:01:21 localhost python3[38485]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:01:22 localhost python3[38502]: ansible-ipaclient_set_hostname Invoked with hostname=np0005543227.ooo.test Dec 3 03:01:22 localhost systemd[1]: Starting Hostname Service... Dec 3 03:01:22 localhost systemd[1]: Started Hostname Service. Dec 3 03:01:22 localhost python3[38521]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543227.ooo.test kdc=ipa.ooo.test on_master=False Dec 3 03:01:23 localhost python3[38542]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005543227.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmpt14udh63 principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Dec 3 03:01:24 localhost python3[38542]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Dec 3 03:01:25 localhost python3[38563]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543227.ooo.test basedn=dc=ooo,dc=test Dec 3 03:01:26 localhost python3[38580]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005543227.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Dec 3 03:01:26 localhost systemd-journald[619]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Dec 3 03:01:26 localhost systemd-journald[619]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 03:01:26 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 03:01:26 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 03:01:26 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 03:01:26 localhost python3[38598]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005543227.ooo.test krb_name=/tmp/tmpt14udh63 debug=False Dec 3 03:01:29 localhost python3[38627]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005543227.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmpt14udh63 ip_addresses=None Dec 3 03:01:33 localhost systemd[1]: Starting System Security Services Daemon... Dec 3 03:01:33 localhost sssd[38662]: Starting up Dec 3 03:01:34 localhost sssd_be[38663]: Starting up Dec 3 03:01:34 localhost sssd_nss[38664]: Starting up Dec 3 03:01:34 localhost sssd_sudo[38667]: Starting up Dec 3 03:01:34 localhost sssd_pam[38665]: Starting up Dec 3 03:01:34 localhost sssd_ssh[38666]: Starting up Dec 3 03:01:34 localhost sssd_pac[38668]: Starting up Dec 3 03:01:34 localhost systemd[1]: Started System Security Services Daemon. Dec 3 03:01:34 localhost systemd[1]: Reloading. Dec 3 03:01:34 localhost systemd-rc-local-generator[38696]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:34 localhost systemd-sysv-generator[38699]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:34 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:35 localhost python3[38724]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Dec 3 03:01:35 localhost systemd[1]: Stopping OpenSSH server daemon... Dec 3 03:01:35 localhost systemd[1]: sshd.service: Deactivated successfully. Dec 3 03:01:35 localhost systemd[1]: Stopped OpenSSH server daemon. Dec 3 03:01:35 localhost systemd[1]: Stopped target sshd-keygen.target. Dec 3 03:01:35 localhost systemd[1]: Stopping sshd-keygen.target... Dec 3 03:01:35 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:01:35 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:01:35 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Dec 3 03:01:35 localhost systemd[1]: Reached target sshd-keygen.target. Dec 3 03:01:35 localhost systemd[1]: Starting OpenSSH server daemon... Dec 3 03:01:35 localhost sshd[38729]: main: sshd: ssh-rsa algorithm is disabled Dec 3 03:01:35 localhost systemd[1]: Started OpenSSH server daemon. Dec 3 03:01:36 localhost python3[38746]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Dec 3 03:01:37 localhost python3[38763]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Dec 3 03:01:37 localhost systemd[1]: Reloading. Dec 3 03:01:37 localhost systemd-sysv-generator[38796]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:37 localhost systemd-rc-local-generator[38790]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:37 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:37 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Dec 3 03:01:37 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Dec 3 03:01:37 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Dec 3 03:01:37 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Dec 3 03:01:37 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Dec 3 03:01:37 localhost python3[38822]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpt14udh63 state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:38 localhost python3[38838]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005543227.ooo.test sssd=True force=True Dec 3 03:01:39 localhost python3[38859]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005543227.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Dec 3 03:01:39 localhost python3[38878]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:40 localhost python3[38894]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpt14udh63 state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:40 localhost python3[38910]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpt14udh63.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:41 localhost python3[38926]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 03:01:41 localhost systemd[1]: Reloading. Dec 3 03:01:41 localhost systemd-rc-local-generator[38950]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:01:41 localhost systemd-sysv-generator[38955]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:01:41 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:01:41 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Dec 3 03:01:41 localhost certmonger[38965]: 2025-12-03 08:01:41 [38965] Changing to root directory. Dec 3 03:01:41 localhost certmonger[38965]: 2025-12-03 08:01:41 [38965] Obtaining system lock. Dec 3 03:01:41 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Dec 3 03:01:41 localhost certmonger[38966]: 2025-12-03 08:01:41 [38966] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[38967]: 2025-12-03 08:01:41 [38967] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[38968]: 2025-12-03 08:01:41 [38968] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[38969]: 2025-12-03 08:01:41 [38969] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[38970]: 2025-12-03 08:01:41 [38970] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[38971]: 2025-12-03 08:01:41 [38971] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[38972]: 2025-12-03 08:01:41 [38972] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[38973]: 2025-12-03 08:01:41 [38973] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:01:41 localhost certmonger[38974]: 2025-12-03 08:01:41 [38974] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[38975]: 2025-12-03 08:01:41 [38975] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[38976]: 2025-12-03 08:01:41 [38976] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[38977]: 2025-12-03 08:01:41 [38977] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[38978]: 2025-12-03 08:01:41 [38978] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[38979]: 2025-12-03 08:01:41 [38979] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[38980]: 2025-12-03 08:01:41 [38980] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[38981]: 2025-12-03 08:01:41 [38981] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Dec 3 03:01:41 localhost certmonger[38982]: 2025-12-03 08:01:41 [38982] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[38983]: 2025-12-03 08:01:41 [38983] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[38984]: 2025-12-03 08:01:41 [38984] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[38985]: 2025-12-03 08:01:41 [38985] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[38986]: 2025-12-03 08:01:41 [38986] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[38987]: 2025-12-03 08:01:41 [38987] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[38988]: 2025-12-03 08:01:41 [38988] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[38989]: 2025-12-03 08:01:41 [38989] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Dec 3 03:01:41 localhost certmonger[38965]: 2025-12-03 08:01:41 [38965] No hooks set for ca-pre-save command. Dec 3 03:01:41 localhost certmonger[38965]: 2025-12-03 08:01:41 [38965] No hooks set for ca-post-save command. Dec 3 03:01:41 localhost certmonger[38992]: 2025-12-03 08:01:41 [38992] Certificate "Local Signing Authority" valid for 31535999s. Dec 3 03:01:41 localhost certmonger[38965]: 2025-12-03 08:01:41 [38965] No hooks set for ca-pre-save command. Dec 3 03:01:41 localhost certmonger[38965]: 2025-12-03 08:01:41 [38965] No hooks set for ca-post-save command. Dec 3 03:01:41 localhost certmonger[38995]: 2025-12-03 08:01:41 [38995] Certificate "OOO.TEST IPA CA" valid for 631151018s. Dec 3 03:01:50 localhost python3[39043]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 03:01:50 localhost python3[39086]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764748909.7854118-104937-16562416343842/source _original_basename=tmp1umng0ue follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:01:50 localhost python3[39116]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 03:01:52 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 3 03:01:53 localhost python3[39242]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 03:01:55 localhost python3[39363]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Dec 3 03:01:57 localhost python3[39379]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 03:01:57 localhost python3[39395]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 03:01:58 localhost python3[39411]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 03:01:59 localhost python3[39431]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:02:02 localhost python3[39448]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 03:02:05 localhost python3[39465]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:02:05 localhost python3[39481]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 03:02:05 localhost python3[39497]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 03:02:06 localhost systemd[1]: Reloading. Dec 3 03:02:06 localhost systemd-rc-local-generator[39521]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 03:02:06 localhost systemd-sysv-generator[39524]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 03:02:06 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 03:02:07 localhost python3[39551]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005543227.ctlplane.ooo.test'] principal=['HTTP/np0005543227.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.ctlplane.ooo.test" for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.ctlplane.ooo.test Dec 3 03:02:07 localhost certmonger[39561]: " for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543227.ctlplane.ooo.test@OOO.TEST Dec 3 03:02:07 localhost certmonger[39561]: " for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:07 localhost certmonger[39561]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTQzMjI3LmN0bHBsYW5lLm9v Dec 3 03:02:07 localhost certmonger[39561]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnpaQxAlY5+hP Dec 3 03:02:07 localhost certmonger[39561]: 3DodW3kX+PChwtnx90ymgRA0vU2Ohnl1ui7QShylYU2P91biULQu/n/80dABs+Yw Dec 3 03:02:07 localhost certmonger[39561]: u5nPNaSfI7cxelvmKI64HPy+hDUoXWvy3pxqVJGug5vz7aECiFqUYkyGgNwzngM/ Dec 3 03:02:07 localhost certmonger[39561]: 2/16KX4jEDi62r8tV9aZhAGZXefyLQhHEkZb4AAEqCjD1Btn/rxJ6MI0Geb4CQhD Dec 3 03:02:07 localhost certmonger[39561]: Vhs6BpYc61z1Ogv2xYYenf0CtkFBKTujz89ipL4TI9RbM0NNIsg2lb0HCDjo/cyi Dec 3 03:02:07 localhost certmonger[39561]: /kB0Merq1ZWjQYmLqwzcs9le+zq+Gq2HNjq2F5/Gi7DwimFWgqNxHlvtTj6NNpkg Dec 3 03:02:07 localhost certmonger[39561]: tbtT52fX/QIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAA Dec 3 03:02:07 localhost certmonger[39561]: MwAwADgAMAAyADAANzCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Dec 3 03:02:07 localhost certmonger[39561]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1NDMyMjcuY3RscGxhbmUub29vLnRlc3Sg Dec 3 03:02:07 localhost certmonger[39561]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28u Dec 3 03:02:07 localhost certmonger[39561]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Dec 3 03:02:07 localhost certmonger[39561]: oSgwJhsESFRUUBsebnAwMDA1NTQzMjI3LmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Dec 3 03:02:07 localhost certmonger[39561]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Dec 3 03:02:07 localhost certmonger[39561]: BBQW/EOnjgXo0uQUJju4hiM25pWtzjANBgkqhkiG9w0BAQsFAAOCAQEAJqpcxeA3 Dec 3 03:02:07 localhost certmonger[39561]: jRywfqXejAh4sOuuv36Fw7Y+52CxgI/ZDMp+EfALFld9eXFDJGb4iA+8t/ZfsJX8 Dec 3 03:02:07 localhost certmonger[39561]: p3tjzuqn5+NVIv6nEKflReVmjQKhWD62L8KLHOMrZdsyuuKxwZbTU/8OE3ukdPLe Dec 3 03:02:07 localhost certmonger[39561]: cMmVRYagy9SOcpGSQpffIKJ7k38LopHO3x09mSr/ChE2OvMATrmvw2sevIjs7Lcj Dec 3 03:02:07 localhost certmonger[39561]: VaM/VH3T6VXpbb7FiqYuFpSPY3U4xfECuuoyrOQVvNWXOjyRUyckNRviu4FaU2HV Dec 3 03:02:07 localhost certmonger[39561]: Yw1J332IeG0hEhLLTZt1i5eXMlwo3gnyFc53j9UhuwiaRiUgzEaKu/Go9cgPsUg+ Dec 3 03:02:07 localhost certmonger[39561]: 5KWy7QY8XTsxEQ== Dec 3 03:02:07 localhost certmonger[39561]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:07 localhost certmonger[39561]: " for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnpaQxAlY5+hP3DodW3kX+PChwtnx90ymgRA0vU2Ohnl1ui7QShylYU2P91biULQu/n/80dABs+Ywu5nPNaSfI7cxelvmKI64HPy+hDUoXWvy3pxqVJGug5vz7aECiFqUYkyGgNwzngM/2/16KX4jEDi62r8tV9aZhAGZXefyLQhHEkZb4AAEqCjD1Btn/rxJ6MI0Geb4CQhDVhs6BpYc61z1Ogv2xYYenf0CtkFBKTujz89ipL4TI9RbM0NNIsg2lb0HCDjo/cyi/kB0Merq1ZWjQYmLqwzcs9le+zq+Gq2HNjq2F5/Gi7DwimFWgqNxHlvtTj6NNpkgtbtT52fX/QIDAQAB" for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:07 localhost certmonger[39561]: 2025-12-03 08:02:07 [39561] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39561]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:07 localhost certmonger[39561]: Certificate: "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" Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Certificate submission still ongoing. Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Certificate submission attempt complete. Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Child status = 0. Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Child output: Dec 3 03:02:07 localhost certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[38965]: MIIFSTCCA7GgAwIBAgIBCzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:07 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:07 localhost certmonger[38965]: MDIwN1oXDTI3MTIwNDA4MDIwN1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:07 localhost certmonger[38965]: BAMMHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:07 localhost certmonger[38965]: AQEBBQADggEPADCCAQoCggEBAJ6WkMQJWOfoT9w6HVt5F/jwocLZ8fdMpoEQNL1N Dec 3 03:02:07 localhost certmonger[38965]: joZ5dbou0EocpWFNj/dW4lC0Lv5//NHQAbPmMLuZzzWknyO3MXpb5iiOuBz8voQ1 Dec 3 03:02:07 localhost certmonger[38965]: KF1r8t6calSRroOb8+2hAohalGJMhoDcM54DP9v9eil+IxA4utq/LVfWmYQBmV3n Dec 3 03:02:07 localhost certmonger[38965]: 8i0IRxJGW+AABKgow9QbZ/68SejCNBnm+AkIQ1YbOgaWHOtc9ToL9sWGHp39ArZB Dec 3 03:02:07 localhost certmonger[38965]: QSk7o8/PYqS+EyPUWzNDTSLINpW9Bwg46P3Mov5AdDHq6tWVo0GJi6sM3LPZXvs6 Dec 3 03:02:07 localhost certmonger[38965]: vhqthzY6thefxouw8IphVoKjcR5b7U4+jTaZILW7U+dn1/0CAwEAAaOCAd0wggHZ Dec 3 03:02:07 localhost certmonger[38965]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:07 localhost certmonger[38965]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:07 localhost certmonger[38965]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:07 localhost certmonger[38965]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:07 localhost certmonger[38965]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:07 localhost certmonger[38965]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNxijG5+AZqOy+tScRDxrWXNfOAM Dec 3 03:02:07 localhost certmonger[38965]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdKA8 Dec 3 03:02:07 localhost certmonger[38965]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI3LmN0bHBsYW5lLm9vby50 Dec 3 03:02:07 localhost certmonger[38965]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:07 localhost certmonger[38965]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjcuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Dec 3 03:02:07 localhost certmonger[38965]: hvcNAQELBQADggGBAAWBectbH2S1ocB0hwcSj+0VgLM4RgCgRR1FlF/Q/EJ55kbA Dec 3 03:02:07 localhost certmonger[38965]: GdX6uIz9HICEVbvfweAWGrA0lDl0l1ILVzYpVb3j+tYdUPxN9KOqIsPUGH4AHHs5 Dec 3 03:02:07 localhost certmonger[38965]: KVjZYXwhX+RK9gjqQeG3rFTyaiJ/2eEqG3CzQTBDSKKV5quSCGFD80sD8eQ00+2w Dec 3 03:02:07 localhost certmonger[38965]: SzI1wNaPVPmOy6MfGyEIhlTCD+WjNeSQB0p9RIvphfyLnNpE1bNyVFOs5zY6/RHn Dec 3 03:02:07 localhost certmonger[38965]: qlubV56SG4K6lNIRNeXwhGzzC0pGRIwdQIEWfEoIJGFTxuEaLMkL22mKuXcaw2wC Dec 3 03:02:07 localhost certmonger[38965]: dqLMqCFBXEJFmRYX0QM4fHKENgjS44PrMcyDsRTzxAu6ctTR3Fk/DlSeaeE3jPuy Dec 3 03:02:07 localhost certmonger[38965]: 4RAt+br8xnqueO1cKSgJ8G9qXJLtCsrcTC+KK1xBIxCuhOx8UTBZIGGvlZhqZ6/v Dec 3 03:02:07 localhost certmonger[38965]: zBhxKpPOcAcsiDObMioaORtsTR6n1wgnwJ9d6Uhhjx2esGEVNA1skWvAIzxUYcf6 Dec 3 03:02:07 localhost certmonger[38965]: ZhR5zfRsP5nkfyoSBQ== Dec 3 03:02:07 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[38965]: " Dec 3 03:02:07 localhost certmonger[39563]: 2025-12-03 08:02:07 [39563] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[39563]: MIIFSTCCA7GgAwIBAgIBCzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:07 localhost certmonger[39563]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:07 localhost certmonger[39563]: MDIwN1oXDTI3MTIwNDA4MDIwN1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:07 localhost certmonger[39563]: BAMMHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:07 localhost certmonger[39563]: AQEBBQADggEPADCCAQoCggEBAJ6WkMQJWOfoT9w6HVt5F/jwocLZ8fdMpoEQNL1N Dec 3 03:02:07 localhost certmonger[39563]: joZ5dbou0EocpWFNj/dW4lC0Lv5//NHQAbPmMLuZzzWknyO3MXpb5iiOuBz8voQ1 Dec 3 03:02:07 localhost certmonger[39563]: KF1r8t6calSRroOb8+2hAohalGJMhoDcM54DP9v9eil+IxA4utq/LVfWmYQBmV3n Dec 3 03:02:07 localhost certmonger[39563]: 8i0IRxJGW+AABKgow9QbZ/68SejCNBnm+AkIQ1YbOgaWHOtc9ToL9sWGHp39ArZB Dec 3 03:02:07 localhost certmonger[39563]: QSk7o8/PYqS+EyPUWzNDTSLINpW9Bwg46P3Mov5AdDHq6tWVo0GJi6sM3LPZXvs6 Dec 3 03:02:07 localhost certmonger[39563]: vhqthzY6thefxouw8IphVoKjcR5b7U4+jTaZILW7U+dn1/0CAwEAAaOCAd0wggHZ Dec 3 03:02:07 localhost certmonger[39563]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:07 localhost certmonger[39563]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:07 localhost certmonger[39563]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:07 localhost certmonger[39563]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:07 localhost certmonger[39563]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:07 localhost certmonger[39563]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNxijG5+AZqOy+tScRDxrWXNfOAM Dec 3 03:02:07 localhost certmonger[39563]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdKA8 Dec 3 03:02:07 localhost certmonger[39563]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI3LmN0bHBsYW5lLm9vby50 Dec 3 03:02:07 localhost certmonger[39563]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:07 localhost certmonger[39563]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjcuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Dec 3 03:02:07 localhost certmonger[39563]: hvcNAQELBQADggGBAAWBectbH2S1ocB0hwcSj+0VgLM4RgCgRR1FlF/Q/EJ55kbA Dec 3 03:02:07 localhost certmonger[39563]: GdX6uIz9HICEVbvfweAWGrA0lDl0l1ILVzYpVb3j+tYdUPxN9KOqIsPUGH4AHHs5 Dec 3 03:02:07 localhost certmonger[39563]: KVjZYXwhX+RK9gjqQeG3rFTyaiJ/2eEqG3CzQTBDSKKV5quSCGFD80sD8eQ00+2w Dec 3 03:02:07 localhost certmonger[39563]: SzI1wNaPVPmOy6MfGyEIhlTCD+WjNeSQB0p9RIvphfyLnNpE1bNyVFOs5zY6/RHn Dec 3 03:02:07 localhost certmonger[39563]: qlubV56SG4K6lNIRNeXwhGzzC0pGRIwdQIEWfEoIJGFTxuEaLMkL22mKuXcaw2wC Dec 3 03:02:07 localhost certmonger[39563]: dqLMqCFBXEJFmRYX0QM4fHKENgjS44PrMcyDsRTzxAu6ctTR3Fk/DlSeaeE3jPuy Dec 3 03:02:07 localhost certmonger[39563]: 4RAt+br8xnqueO1cKSgJ8G9qXJLtCsrcTC+KK1xBIxCuhOx8UTBZIGGvlZhqZ6/v Dec 3 03:02:07 localhost certmonger[39563]: zBhxKpPOcAcsiDObMioaORtsTR6n1wgnwJ9d6Uhhjx2esGEVNA1skWvAIzxUYcf6 Dec 3 03:02:07 localhost certmonger[39563]: ZhR5zfRsP5nkfyoSBQ== Dec 3 03:02:07 localhost certmonger[39563]: -----END CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[39563]: ". Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Certificate submission still ongoing. Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Certificate submission postprocessing complete. Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Child status = 0. Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Child output: Dec 3 03:02:07 localhost certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nZhR5zfRsP5nkfyoSBQ==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:07 localhost certmonger[38965]: " Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[38965]: MIIFSTCCA7GgAwIBAgIBCzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:07 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:07 localhost certmonger[38965]: MDIwN1oXDTI3MTIwNDA4MDIwN1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:07 localhost certmonger[38965]: BAMMHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:07 localhost certmonger[38965]: AQEBBQADggEPADCCAQoCggEBAJ6WkMQJWOfoT9w6HVt5F/jwocLZ8fdMpoEQNL1N Dec 3 03:02:07 localhost certmonger[38965]: joZ5dbou0EocpWFNj/dW4lC0Lv5//NHQAbPmMLuZzzWknyO3MXpb5iiOuBz8voQ1 Dec 3 03:02:07 localhost certmonger[38965]: KF1r8t6calSRroOb8+2hAohalGJMhoDcM54DP9v9eil+IxA4utq/LVfWmYQBmV3n Dec 3 03:02:07 localhost certmonger[38965]: 8i0IRxJGW+AABKgow9QbZ/68SejCNBnm+AkIQ1YbOgaWHOtc9ToL9sWGHp39ArZB Dec 3 03:02:07 localhost certmonger[38965]: QSk7o8/PYqS+EyPUWzNDTSLINpW9Bwg46P3Mov5AdDHq6tWVo0GJi6sM3LPZXvs6 Dec 3 03:02:07 localhost certmonger[38965]: vhqthzY6thefxouw8IphVoKjcR5b7U4+jTaZILW7U+dn1/0CAwEAAaOCAd0wggHZ Dec 3 03:02:07 localhost certmonger[38965]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:07 localhost certmonger[38965]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:07 localhost certmonger[38965]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:07 localhost certmonger[38965]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:07 localhost certmonger[38965]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:07 localhost certmonger[38965]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNxijG5+AZqOy+tScRDxrWXNfOAM Dec 3 03:02:07 localhost certmonger[38965]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdKA8 Dec 3 03:02:07 localhost certmonger[38965]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI3LmN0bHBsYW5lLm9vby50 Dec 3 03:02:07 localhost certmonger[38965]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:07 localhost certmonger[38965]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjcuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Dec 3 03:02:07 localhost certmonger[38965]: hvcNAQELBQADggGBAAWBectbH2S1ocB0hwcSj+0VgLM4RgCgRR1FlF/Q/EJ55kbA Dec 3 03:02:07 localhost certmonger[38965]: GdX6uIz9HICEVbvfweAWGrA0lDl0l1ILVzYpVb3j+tYdUPxN9KOqIsPUGH4AHHs5 Dec 3 03:02:07 localhost certmonger[38965]: KVjZYXwhX+RK9gjqQeG3rFTyaiJ/2eEqG3CzQTBDSKKV5quSCGFD80sD8eQ00+2w Dec 3 03:02:07 localhost certmonger[38965]: SzI1wNaPVPmOy6MfGyEIhlTCD+WjNeSQB0p9RIvphfyLnNpE1bNyVFOs5zY6/RHn Dec 3 03:02:07 localhost certmonger[38965]: qlubV56SG4K6lNIRNeXwhGzzC0pGRIwdQIEWfEoIJGFTxuEaLMkL22mKuXcaw2wC Dec 3 03:02:07 localhost certmonger[38965]: dqLMqCFBXEJFmRYX0QM4fHKENgjS44PrMcyDsRTzxAu6ctTR3Fk/DlSeaeE3jPuy Dec 3 03:02:07 localhost certmonger[38965]: 4RAt+br8xnqueO1cKSgJ8G9qXJLtCsrcTC+KK1xBIxCuhOx8UTBZIGGvlZhqZ6/v Dec 3 03:02:07 localhost certmonger[38965]: zBhxKpPOcAcsiDObMioaORtsTR6n1wgnwJ9d6Uhhjx2esGEVNA1skWvAIzxUYcf6 Dec 3 03:02:07 localhost certmonger[38965]: ZhR5zfRsP5nkfyoSBQ== Dec 3 03:02:07 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:07 localhost certmonger[38965]: ". Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] No hooks set for pre-save command. Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:07 localhost certmonger[39571]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Dec 3 03:02:07 localhost certmonger[38965]: 2025-12-03 08:02:07 [38965] Wrote to /var/lib/certmonger/requests/20251203080207 Dec 3 03:02:08 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Dec 3 03:02:08 localhost python3[39588]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005543227.storage.ooo.test'] principal=['HTTP/np0005543227.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.storage.ooo.test" for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.storage.ooo.test Dec 3 03:02:08 localhost certmonger[39602]: " for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543227.storage.ooo.test@OOO.TEST Dec 3 03:02:08 localhost certmonger[39602]: " for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:08 localhost certmonger[39602]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29v Dec 3 03:02:08 localhost certmonger[39602]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC0YywkmxIz3Q9l Dec 3 03:02:08 localhost certmonger[39602]: ElHhxz4vV7a3YiBQv59/eSwlj2VEegaMUfG85C///puAAcyvA/CK5cadDo8vqVeL Dec 3 03:02:08 localhost certmonger[39602]: MEMZho/kJV2myHvAZqFonCxrhYF6/hJC5jmgAhBaMZJzzrjlpHPq0LTh1xV4GgKk Dec 3 03:02:08 localhost certmonger[39602]: som0iVOUMOicF8HUY1x8Ibr1SKxfOTIaFP+1sKRq9pKkAq/fhdXK7zola3MaRc8n Dec 3 03:02:08 localhost certmonger[39602]: A02HGifP6QfMbPLXigvEnEG+BVShqMbOR0S03jxj5vk5wseHLLYaOy7tPWMiVICU Dec 3 03:02:08 localhost certmonger[39602]: 96gnFqxDktcXcps7QyuTuSd8Jcd2swdddLlG81hl1JXmj0uN7RvD90D3VhGlxmeX Dec 3 03:02:08 localhost certmonger[39602]: Y7uRrW4NAgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADIAMAAz Dec 3 03:02:08 localhost certmonger[39602]: ADAAOAAwADIAMAA4MIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Dec 3 03:02:08 localhost certmonger[39602]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0oDsG Dec 3 03:02:08 localhost certmonger[39602]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1NDMyMjcuc3RvcmFnZS5vb28udGVz Dec 3 03:02:08 localhost certmonger[39602]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Dec 3 03:02:08 localhost certmonger[39602]: JRsESFRUUBsdbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Dec 3 03:02:08 localhost certmonger[39602]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFKUI Dec 3 03:02:08 localhost certmonger[39602]: 8dDPDLMkWbmNjs4xfYbtZJoaMA0GCSqGSIb3DQEBCwUAA4IBAQB+KCWwr697LmnC Dec 3 03:02:08 localhost certmonger[39602]: uka1gCBrLzGFWYsimDeE7lAmfoifsjcL8O6TrsXR/Eusrg6ck71Wf0iqeTQ6Qi2B Dec 3 03:02:08 localhost certmonger[39602]: T/1sunb/1nuMZ/Tj3/Hs9q4EoGnSg1v8ffIl+jeBR7kyJLBUX+S2m0xTgViof+F3 Dec 3 03:02:08 localhost certmonger[39602]: Z00iRD+/yeAljykXtsOYF2eMcq6+oGrm8opeWWw/W/JT1Jl7D98EJQr5HPKTtVBv Dec 3 03:02:08 localhost certmonger[39602]: nNzGfshCEGmHwWv7w3/cg5mpGGIfCdS/m8jaRw7WcIqntCpP0bYa7zt8T0EFVheA Dec 3 03:02:08 localhost certmonger[39602]: NhvhIURPgd5Z/yodlMr7+A9LofkRNkKq4rxDvZtAUCs/v6YaI72oa1PSAU4eEofS Dec 3 03:02:08 localhost certmonger[39602]: 8zJP1tgk Dec 3 03:02:08 localhost certmonger[39602]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:08 localhost certmonger[39602]: " for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtGMsJJsSM90PZRJR4cc+L1e2t2IgUL+ff3ksJY9lRHoGjFHxvOQv//6bgAHMrwPwiuXGnQ6PL6lXizBDGYaP5CVdpsh7wGahaJwsa4WBev4SQuY5oAIQWjGSc8645aRz6tC04dcVeBoCpLKJtIlTlDDonBfB1GNcfCG69UisXzkyGhT/tbCkavaSpAKv34XVyu86JWtzGkXPJwNNhxonz+kHzGzy14oLxJxBvgVUoajGzkdEtN48Y+b5OcLHhyy2Gjsu7T1jIlSAlPeoJxasQ5LXF3KbO0Mrk7knfCXHdrMHXXS5RvNYZdSV5o9Lje0bw/dA91YRpcZnl2O7ka1uDQIDAQAB" for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:08 localhost certmonger[39602]: 2025-12-03 08:02:08 [39602] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:08 localhost certmonger[38965]: 2025-12-03 08:02:08 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:08 localhost certmonger[39602]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:08 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Dec 3 03:02:08 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Dec 3 03:02:09 localhost certmonger[39602]: Certificate: "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" Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Certificate submission still ongoing. Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Certificate submission attempt complete. Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Child status = 0. Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Child output: Dec 3 03:02:09 localhost certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:09 localhost certmonger[38965]: MIIFRTCCA62gAwIBAgIBETANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:09 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:09 localhost certmonger[38965]: MDIwOVoXDTI3MTIwNDA4MDIwOVowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 03:02:09 localhost certmonger[38965]: BAMMHW5wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 03:02:09 localhost certmonger[38965]: AQEFAAOCAQ8AMIIBCgKCAQEAtGMsJJsSM90PZRJR4cc+L1e2t2IgUL+ff3ksJY9l Dec 3 03:02:09 localhost certmonger[38965]: RHoGjFHxvOQv//6bgAHMrwPwiuXGnQ6PL6lXizBDGYaP5CVdpsh7wGahaJwsa4WB Dec 3 03:02:09 localhost certmonger[38965]: ev4SQuY5oAIQWjGSc8645aRz6tC04dcVeBoCpLKJtIlTlDDonBfB1GNcfCG69Uis Dec 3 03:02:09 localhost certmonger[38965]: XzkyGhT/tbCkavaSpAKv34XVyu86JWtzGkXPJwNNhxonz+kHzGzy14oLxJxBvgVU Dec 3 03:02:09 localhost certmonger[38965]: oajGzkdEtN48Y+b5OcLHhyy2Gjsu7T1jIlSAlPeoJxasQ5LXF3KbO0Mrk7knfCXH Dec 3 03:02:09 localhost certmonger[38965]: drMHXXS5RvNYZdSV5o9Lje0bw/dA91YRpcZnl2O7ka1uDQIDAQABo4IB2jCCAdYw Dec 3 03:02:09 localhost certmonger[38965]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 03:02:09 localhost certmonger[38965]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 03:02:09 localhost certmonger[38965]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 03:02:09 localhost certmonger[38965]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 03:02:09 localhost certmonger[38965]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 03:02:09 localhost certmonger[38965]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU5/KCSqp95yTBO/yv/EkDo4WQ3Ncw Dec 3 03:02:09 localhost certmonger[38965]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3SgOwYK Dec 3 03:02:09 localhost certmonger[38965]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0 Dec 3 03:02:09 localhost certmonger[38965]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Dec 3 03:02:09 localhost certmonger[38965]: GwRIVFRQGx1ucDAwMDU1NDMyMjcuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Dec 3 03:02:09 localhost certmonger[38965]: AQsFAAOCAYEAocqRZqxzKjVpxCnruZIvajD24MswLAjgGpZw0Lrv8We4+dKpukcp Dec 3 03:02:09 localhost certmonger[38965]: 6rahO23yD4bRdDXJ1g7XVQlUgQYZNf7G7ZlR9TI6gbpoV+e1Y70mCi2ze1Uq/PTc Dec 3 03:02:09 localhost certmonger[38965]: f7hgRcnODJ9Z1HzFnNgM5ZJDdbBEH7oxXIq2OlLLq7/kTqfkFNDYp3FT6fBwCTz0 Dec 3 03:02:09 localhost certmonger[38965]: ga1S9HvArMPuFDHtJvJLWT1OtdapRWk+crb8EGmV0eE93E5i0Lghfcr2j27Q40Qb Dec 3 03:02:09 localhost certmonger[38965]: BihEM0pp2xzTD+GAkS1tmLBQKTRX4ju3NXZbCuCcIUZShK1Ai4J+daEolqgr6nk/ Dec 3 03:02:09 localhost certmonger[38965]: Kw/2+9pYoUZnJFOLiJj4L63MIIjsQY7YXFy1j070lA+1t28aMk2Dj/V1MJAMYDOn Dec 3 03:02:09 localhost certmonger[38965]: xkj6yrx1FQdm6am5ToaOYR8iaI8OSJ6m6cTz9oZJ/2s1/mjuygWRZznqlPb3MO9I Dec 3 03:02:09 localhost certmonger[38965]: Ip9tyJU1dBB34q2/yDT2cdSFzGDPC8pcFdjYcpWydV62mIBSVGtqM6mpnv34Es/u Dec 3 03:02:09 localhost certmonger[38965]: ZpsHOG525iTM Dec 3 03:02:09 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:09 localhost certmonger[38965]: " Dec 3 03:02:09 localhost certmonger[39608]: 2025-12-03 08:02:09 [39608] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:09 localhost certmonger[39608]: MIIFRTCCA62gAwIBAgIBETANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:09 localhost certmonger[39608]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:09 localhost certmonger[39608]: MDIwOVoXDTI3MTIwNDA4MDIwOVowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 03:02:09 localhost certmonger[39608]: BAMMHW5wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 03:02:09 localhost certmonger[39608]: AQEFAAOCAQ8AMIIBCgKCAQEAtGMsJJsSM90PZRJR4cc+L1e2t2IgUL+ff3ksJY9l Dec 3 03:02:09 localhost certmonger[39608]: RHoGjFHxvOQv//6bgAHMrwPwiuXGnQ6PL6lXizBDGYaP5CVdpsh7wGahaJwsa4WB Dec 3 03:02:09 localhost certmonger[39608]: ev4SQuY5oAIQWjGSc8645aRz6tC04dcVeBoCpLKJtIlTlDDonBfB1GNcfCG69Uis Dec 3 03:02:09 localhost certmonger[39608]: XzkyGhT/tbCkavaSpAKv34XVyu86JWtzGkXPJwNNhxonz+kHzGzy14oLxJxBvgVU Dec 3 03:02:09 localhost certmonger[39608]: oajGzkdEtN48Y+b5OcLHhyy2Gjsu7T1jIlSAlPeoJxasQ5LXF3KbO0Mrk7knfCXH Dec 3 03:02:09 localhost certmonger[39608]: drMHXXS5RvNYZdSV5o9Lje0bw/dA91YRpcZnl2O7ka1uDQIDAQABo4IB2jCCAdYw Dec 3 03:02:09 localhost certmonger[39608]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 03:02:09 localhost certmonger[39608]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 03:02:09 localhost certmonger[39608]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 03:02:09 localhost certmonger[39608]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 03:02:09 localhost certmonger[39608]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 03:02:09 localhost certmonger[39608]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU5/KCSqp95yTBO/yv/EkDo4WQ3Ncw Dec 3 03:02:09 localhost certmonger[39608]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3SgOwYK Dec 3 03:02:09 localhost certmonger[39608]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0 Dec 3 03:02:09 localhost certmonger[39608]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Dec 3 03:02:09 localhost certmonger[39608]: GwRIVFRQGx1ucDAwMDU1NDMyMjcuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Dec 3 03:02:09 localhost certmonger[39608]: AQsFAAOCAYEAocqRZqxzKjVpxCnruZIvajD24MswLAjgGpZw0Lrv8We4+dKpukcp Dec 3 03:02:09 localhost certmonger[39608]: 6rahO23yD4bRdDXJ1g7XVQlUgQYZNf7G7ZlR9TI6gbpoV+e1Y70mCi2ze1Uq/PTc Dec 3 03:02:09 localhost certmonger[39608]: f7hgRcnODJ9Z1HzFnNgM5ZJDdbBEH7oxXIq2OlLLq7/kTqfkFNDYp3FT6fBwCTz0 Dec 3 03:02:09 localhost certmonger[39608]: ga1S9HvArMPuFDHtJvJLWT1OtdapRWk+crb8EGmV0eE93E5i0Lghfcr2j27Q40Qb Dec 3 03:02:09 localhost certmonger[39608]: BihEM0pp2xzTD+GAkS1tmLBQKTRX4ju3NXZbCuCcIUZShK1Ai4J+daEolqgr6nk/ Dec 3 03:02:09 localhost certmonger[39608]: Kw/2+9pYoUZnJFOLiJj4L63MIIjsQY7YXFy1j070lA+1t28aMk2Dj/V1MJAMYDOn Dec 3 03:02:09 localhost certmonger[39608]: xkj6yrx1FQdm6am5ToaOYR8iaI8OSJ6m6cTz9oZJ/2s1/mjuygWRZznqlPb3MO9I Dec 3 03:02:09 localhost certmonger[39608]: Ip9tyJU1dBB34q2/yDT2cdSFzGDPC8pcFdjYcpWydV62mIBSVGtqM6mpnv34Es/u Dec 3 03:02:09 localhost certmonger[39608]: ZpsHOG525iTM Dec 3 03:02:09 localhost certmonger[39608]: -----END CERTIFICATE----- Dec 3 03:02:09 localhost certmonger[39608]: ". Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Certificate submission still ongoing. Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Certificate submission postprocessing complete. Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Child status = 0. Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Child output: Dec 3 03:02:09 localhost certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nZpsHOG525iTM\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:09 localhost certmonger[38965]: " Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:09 localhost certmonger[38965]: MIIFRTCCA62gAwIBAgIBETANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:09 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:09 localhost certmonger[38965]: MDIwOVoXDTI3MTIwNDA4MDIwOVowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 03:02:09 localhost certmonger[38965]: BAMMHW5wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 03:02:09 localhost certmonger[38965]: AQEFAAOCAQ8AMIIBCgKCAQEAtGMsJJsSM90PZRJR4cc+L1e2t2IgUL+ff3ksJY9l Dec 3 03:02:09 localhost certmonger[38965]: RHoGjFHxvOQv//6bgAHMrwPwiuXGnQ6PL6lXizBDGYaP5CVdpsh7wGahaJwsa4WB Dec 3 03:02:09 localhost certmonger[38965]: ev4SQuY5oAIQWjGSc8645aRz6tC04dcVeBoCpLKJtIlTlDDonBfB1GNcfCG69Uis Dec 3 03:02:09 localhost certmonger[38965]: XzkyGhT/tbCkavaSpAKv34XVyu86JWtzGkXPJwNNhxonz+kHzGzy14oLxJxBvgVU Dec 3 03:02:09 localhost certmonger[38965]: oajGzkdEtN48Y+b5OcLHhyy2Gjsu7T1jIlSAlPeoJxasQ5LXF3KbO0Mrk7knfCXH Dec 3 03:02:09 localhost certmonger[38965]: drMHXXS5RvNYZdSV5o9Lje0bw/dA91YRpcZnl2O7ka1uDQIDAQABo4IB2jCCAdYw Dec 3 03:02:09 localhost certmonger[38965]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 03:02:09 localhost certmonger[38965]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 03:02:09 localhost certmonger[38965]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 03:02:09 localhost certmonger[38965]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 03:02:09 localhost certmonger[38965]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 03:02:09 localhost certmonger[38965]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQU5/KCSqp95yTBO/yv/EkDo4WQ3Ncw Dec 3 03:02:09 localhost certmonger[38965]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3SgOwYK Dec 3 03:02:09 localhost certmonger[38965]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0 Dec 3 03:02:09 localhost certmonger[38965]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Dec 3 03:02:09 localhost certmonger[38965]: GwRIVFRQGx1ucDAwMDU1NDMyMjcuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Dec 3 03:02:09 localhost certmonger[38965]: AQsFAAOCAYEAocqRZqxzKjVpxCnruZIvajD24MswLAjgGpZw0Lrv8We4+dKpukcp Dec 3 03:02:09 localhost certmonger[38965]: 6rahO23yD4bRdDXJ1g7XVQlUgQYZNf7G7ZlR9TI6gbpoV+e1Y70mCi2ze1Uq/PTc Dec 3 03:02:09 localhost certmonger[38965]: f7hgRcnODJ9Z1HzFnNgM5ZJDdbBEH7oxXIq2OlLLq7/kTqfkFNDYp3FT6fBwCTz0 Dec 3 03:02:09 localhost certmonger[38965]: ga1S9HvArMPuFDHtJvJLWT1OtdapRWk+crb8EGmV0eE93E5i0Lghfcr2j27Q40Qb Dec 3 03:02:09 localhost certmonger[38965]: BihEM0pp2xzTD+GAkS1tmLBQKTRX4ju3NXZbCuCcIUZShK1Ai4J+daEolqgr6nk/ Dec 3 03:02:09 localhost certmonger[38965]: Kw/2+9pYoUZnJFOLiJj4L63MIIjsQY7YXFy1j070lA+1t28aMk2Dj/V1MJAMYDOn Dec 3 03:02:09 localhost certmonger[38965]: xkj6yrx1FQdm6am5ToaOYR8iaI8OSJ6m6cTz9oZJ/2s1/mjuygWRZznqlPb3MO9I Dec 3 03:02:09 localhost certmonger[38965]: Ip9tyJU1dBB34q2/yDT2cdSFzGDPC8pcFdjYcpWydV62mIBSVGtqM6mpnv34Es/u Dec 3 03:02:09 localhost certmonger[38965]: ZpsHOG525iTM Dec 3 03:02:09 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:09 localhost certmonger[38965]: ". Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] No hooks set for pre-save command. Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost certmonger[39618]: Certificate in file "/etc/pki/tls/certs/httpd-storage.crt" issued by CA and saved. Dec 3 03:02:09 localhost certmonger[38965]: 2025-12-03 08:02:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080208 Dec 3 03:02:09 localhost auditd[722]: queue to plugins is full - dropping event Dec 3 03:02:09 localhost auditd[722]: queue to plugins is full - dropping event Dec 3 03:02:09 localhost auditd[722]: queue to plugins is full - dropping event Dec 3 03:02:09 localhost auditd[722]: queue to plugins is full - dropping event Dec 3 03:02:09 localhost auditd[722]: queue to plugins is full - dropping event Dec 3 03:02:09 localhost auditd[722]: auditd queue full reporting limit reached - ending dropped event notifications Dec 3 03:02:09 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:09 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:09 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:09 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost python3[39634]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005543227.storagemgmt.ooo.test'] principal=['HTTP/np0005543227.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.storagemgmt.ooo.test" for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.storagemgmt.ooo.test Dec 3 03:02:10 localhost certmonger[39645]: " for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543227.storagemgmt.ooo.test@OOO.TEST Dec 3 03:02:10 localhost certmonger[39645]: " for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:10 localhost certmonger[39645]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LnN0b3JhZ2VtZ210 Dec 3 03:02:10 localhost certmonger[39645]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+EcvQqSv Dec 3 03:02:10 localhost certmonger[39645]: GghGT7Dn+pY+Xqhlxq+VKsy1Vtg++68k2Bx5/d5gJAV8gWupk1xy0fZM+F66LdwS Dec 3 03:02:10 localhost certmonger[39645]: zjMtcvHNbzBNlNROPEB/DocluVhSf3IJ6Ccq2mIvepkh2+Zu7w/71KCVIUC1WZal Dec 3 03:02:10 localhost certmonger[39645]: 5eN0rpgJxA3y3UvOzWsNTLUU0CLNdWMv7Bb14R+GPQLpgDrLd4tB+BIv6p4TyeLg Dec 3 03:02:10 localhost certmonger[39645]: njT7Z41QFX2j1ZITGxRR5UHyudHxhZJnzm9wSDeWxP+8w0qHwZV2fWMz64F5lbLy Dec 3 03:02:10 localhost certmonger[39645]: wQ428FxVgp4yNvWT6H+uZUjZvNIa41lR4PWzpgI5Fmp4IxJ4d8KSPlBsIeSKbd4f Dec 3 03:02:10 localhost certmonger[39645]: bmauH3tJlLI00wIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 03:02:10 localhost certmonger[39645]: ADAAMwAwADgAMAAyADEAMDCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Dec 3 03:02:10 localhost certmonger[39645]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1NDMyMjcuc3RvcmFnZW1nbXQub29v Dec 3 03:02:10 localhost certmonger[39645]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU0MzIyNy5zdG9yYWdl Dec 3 03:02:10 localhost certmonger[39645]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Dec 3 03:02:10 localhost certmonger[39645]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTQzMjI3LnN0b3JhZ2VtZ210Lm9v Dec 3 03:02:10 localhost certmonger[39645]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Dec 3 03:02:10 localhost certmonger[39645]: AjAAMB0GA1UdDgQWBBSlCPHQzwyzJFm5jY7OMX2G7WSaGjANBgkqhkiG9w0BAQsF Dec 3 03:02:10 localhost certmonger[39645]: AAOCAQEAI06/9wlA3PZ2fMpfk3whHJaEWUiK5FqsAQp+/eBEU25HTA0I5E3iW+RL Dec 3 03:02:10 localhost certmonger[39645]: easD6JPrm+mQFfT1CxYqnpnDmERBkSzJ7rnAXWcfaytOzhmhQV32OXr+HXOogcfo Dec 3 03:02:10 localhost certmonger[39645]: Amq183YKWOT47mjczdASpluF0/MaotdOmWoCNrHYniQRgjMn8zyWwe2Xr84GiANB Dec 3 03:02:10 localhost certmonger[39645]: paDogCuhl7eoZvF5D5sAX0I9T7ckOm6tyM7y8XJPUze7PhhRtQiCrbdZdaqkvTk8 Dec 3 03:02:10 localhost certmonger[39645]: 4e/an03Vf1Fd1vv00/GraUTecIrJ5rVcK97vIFD45iZJPE0/MlEWBDl5PtRAKCT3 Dec 3 03:02:10 localhost certmonger[39645]: V0vNPbze4C72NRigMFRJ+3I8XZXsDg== Dec 3 03:02:10 localhost certmonger[39645]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:10 localhost certmonger[39645]: " for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQD4Ry9CpK8aCEZPsOf6lj5eqGXGr5UqzLVW2D77ryTYHHn93mAkBXyBa6mTXHLR9kz4Xrot3BLOMy1y8c1vME2U1E48QH8OhyW5WFJ/cgnoJyraYi96mSHb5m7vD/vUoJUhQLVZlqXl43SumAnEDfLdS87Naw1MtRTQIs11Yy/sFvXhH4Y9AumAOst3i0H4Ei/qnhPJ4uCeNPtnjVAVfaPVkhMbFFHlQfK50fGFkmfOb3BIN5bE/7zDSofBlXZ9YzPrgXmVsvLBDjbwXFWCnjI29ZPof65lSNm80hrjWVHg9bOmAjkWangjEnh3wpI+UGwh5Ipt3h9uZq4fe0mUsjTTAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEApovTspPUxat/vfjKUeeZ5720LOfuXkj87/Fu1CLqexPe16Bwy/IUWt56uqmFWT95aFCI/a+tFqpHQMTaHTxWRyTRys/PsCou9qC2+JIB+7oR1r+xls4UNP6yllKWioqv4uyNdu5eznAmE0n6BfVeRqvPc7FH+GhN6IBqfBHyeQBST2XUuuTzyvFHeHfCtK5z01s2gDFjHFtnhLOC0c4CFQVTwBKUe/LK9PM0ef+9YV/WtmRm5JpLNWctGtbB3IdgpLzvZPZr4qYAaLBjW+Ht0uNPvSdG7b2Z1xdMn2zutWh7Vf2TmAohyZ8fT+4YZ8XR4Bl496v0KWwgYe8sug4lgA==" for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+EcvQqSvGghGT7Dn+pY+Xqhlxq+VKsy1Vtg++68k2Bx5/d5gJAV8gWupk1xy0fZM+F66LdwSzjMtcvHNbzBNlNROPEB/DocluVhSf3IJ6Ccq2mIvepkh2+Zu7w/71KCVIUC1WZal5eN0rpgJxA3y3UvOzWsNTLUU0CLNdWMv7Bb14R+GPQLpgDrLd4tB+BIv6p4TyeLgnjT7Z41QFX2j1ZITGxRR5UHyudHxhZJnzm9wSDeWxP+8w0qHwZV2fWMz64F5lbLywQ428FxVgp4yNvWT6H+uZUjZvNIa41lR4PWzpgI5Fmp4IxJ4d8KSPlBsIeSKbd4fbmauH3tJlLI00wIDAQAB" for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:10 localhost certmonger[39645]: 2025-12-03 08:02:10 [39645] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39645]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost certmonger[39645]: Certificate: "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" Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Certificate submission still ongoing. Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Certificate submission attempt complete. Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Child status = 0. Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Child output: Dec 3 03:02:10 localhost certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[38965]: MIIFVTCCA72gAwIBAgIBEzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:10 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:10 localhost certmonger[38965]: MDIxMFoXDTI3MTIwNDA4MDIxMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:10 localhost certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:10 localhost certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAPhHL0KkrxoIRk+w5/qWPl6oZcavlSrMtVbY Dec 3 03:02:10 localhost certmonger[38965]: PvuvJNgcef3eYCQFfIFrqZNcctH2TPheui3cEs4zLXLxzW8wTZTUTjxAfw6HJblY Dec 3 03:02:10 localhost certmonger[38965]: Un9yCegnKtpiL3qZIdvmbu8P+9SglSFAtVmWpeXjdK6YCcQN8t1Lzs1rDUy1FNAi Dec 3 03:02:10 localhost certmonger[38965]: zXVjL+wW9eEfhj0C6YA6y3eLQfgSL+qeE8ni4J40+2eNUBV9o9WSExsUUeVB8rnR Dec 3 03:02:10 localhost certmonger[38965]: 8YWSZ85vcEg3lsT/vMNKh8GVdn1jM+uBeZWy8sEONvBcVYKeMjb1k+h/rmVI2bzS Dec 3 03:02:10 localhost certmonger[38965]: GuNZUeD1s6YCORZqeCMSeHfCkj5QbCHkim3eH25mrh97SZSyNNMCAwEAAaOCAeYw Dec 3 03:02:10 localhost certmonger[38965]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:10 localhost certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:10 localhost certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:10 localhost certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:10 localhost certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:10 localhost certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFK9JuZoBfm10ReQS8mC+f4Ni Dec 3 03:02:10 localhost certmonger[38965]: /lIcMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28u Dec 3 03:02:10 localhost certmonger[38965]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI3LnN0b3JhZ2Vt Dec 3 03:02:10 localhost certmonger[38965]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:10 localhost certmonger[38965]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjcuc3RvcmFnZW1nbXQub29v Dec 3 03:02:10 localhost certmonger[38965]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAD6y4FG6TTW5sSvvPnb4qdFcuOnRZ0I2 Dec 3 03:02:10 localhost certmonger[38965]: O+1bk7raMU6faaYM9638x6KCK6YlkEMnH7vCAU1WFzsX3zijnWf8AgcSdrBgaF4r Dec 3 03:02:10 localhost certmonger[38965]: u/LzwRKJj7VJKfw8jXxTk8WAcfcCB3com+nD/I1KpL9x8pLV8KV1SkfLG+gx/eim Dec 3 03:02:10 localhost certmonger[38965]: XybfrlbLJTsdDB9nLihA8OKA4bPPRAkzgL33YWSycnKNqJKkeL57l6qTHws1OY21 Dec 3 03:02:10 localhost certmonger[38965]: kJb9T533ex9kGdkXGzfG0NxLH5tayWzPVXuqY/rwqZ0aaEsbLyfPMNIfPXsg9XXE Dec 3 03:02:10 localhost certmonger[38965]: 9cGOAvH+3/4OEVysBeqQgzUbnH6PfTkzRqpjLQdtHWSKKAPf5ebZf3Mp+Cab+wPo Dec 3 03:02:10 localhost certmonger[38965]: Dq6Y7R0FDav8oZmyhl6RCISkNB3DsBUL2t3+G0RbwnQIvz4wi/mIespFzwV4lrYh Dec 3 03:02:10 localhost certmonger[38965]: bdBRFATgv87nt/wTiD0q295JAAl4/lo+mDIikGVFiU/WG0FQOCpqFmv2LzGQy0Ni Dec 3 03:02:10 localhost certmonger[38965]: cZL/nlXqwskAsdJaYYnAGft3LcVyOi4pew== Dec 3 03:02:10 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[38965]: " Dec 3 03:02:10 localhost certmonger[39647]: 2025-12-03 08:02:10 [39647] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39647]: MIIFVTCCA72gAwIBAgIBEzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:10 localhost certmonger[39647]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:10 localhost certmonger[39647]: MDIxMFoXDTI3MTIwNDA4MDIxMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:10 localhost certmonger[39647]: BAMMIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:10 localhost certmonger[39647]: hvcNAQEBBQADggEPADCCAQoCggEBAPhHL0KkrxoIRk+w5/qWPl6oZcavlSrMtVbY Dec 3 03:02:10 localhost certmonger[39647]: PvuvJNgcef3eYCQFfIFrqZNcctH2TPheui3cEs4zLXLxzW8wTZTUTjxAfw6HJblY Dec 3 03:02:10 localhost certmonger[39647]: Un9yCegnKtpiL3qZIdvmbu8P+9SglSFAtVmWpeXjdK6YCcQN8t1Lzs1rDUy1FNAi Dec 3 03:02:10 localhost certmonger[39647]: zXVjL+wW9eEfhj0C6YA6y3eLQfgSL+qeE8ni4J40+2eNUBV9o9WSExsUUeVB8rnR Dec 3 03:02:10 localhost certmonger[39647]: 8YWSZ85vcEg3lsT/vMNKh8GVdn1jM+uBeZWy8sEONvBcVYKeMjb1k+h/rmVI2bzS Dec 3 03:02:10 localhost certmonger[39647]: GuNZUeD1s6YCORZqeCMSeHfCkj5QbCHkim3eH25mrh97SZSyNNMCAwEAAaOCAeYw Dec 3 03:02:10 localhost certmonger[39647]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:10 localhost certmonger[39647]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:10 localhost certmonger[39647]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:10 localhost certmonger[39647]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:10 localhost certmonger[39647]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:10 localhost certmonger[39647]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFK9JuZoBfm10ReQS8mC+f4Ni Dec 3 03:02:10 localhost certmonger[39647]: /lIcMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28u Dec 3 03:02:10 localhost certmonger[39647]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI3LnN0b3JhZ2Vt Dec 3 03:02:10 localhost certmonger[39647]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:10 localhost certmonger[39647]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjcuc3RvcmFnZW1nbXQub29v Dec 3 03:02:10 localhost certmonger[39647]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAD6y4FG6TTW5sSvvPnb4qdFcuOnRZ0I2 Dec 3 03:02:10 localhost certmonger[39647]: O+1bk7raMU6faaYM9638x6KCK6YlkEMnH7vCAU1WFzsX3zijnWf8AgcSdrBgaF4r Dec 3 03:02:10 localhost certmonger[39647]: u/LzwRKJj7VJKfw8jXxTk8WAcfcCB3com+nD/I1KpL9x8pLV8KV1SkfLG+gx/eim Dec 3 03:02:10 localhost certmonger[39647]: XybfrlbLJTsdDB9nLihA8OKA4bPPRAkzgL33YWSycnKNqJKkeL57l6qTHws1OY21 Dec 3 03:02:10 localhost certmonger[39647]: kJb9T533ex9kGdkXGzfG0NxLH5tayWzPVXuqY/rwqZ0aaEsbLyfPMNIfPXsg9XXE Dec 3 03:02:10 localhost certmonger[39647]: 9cGOAvH+3/4OEVysBeqQgzUbnH6PfTkzRqpjLQdtHWSKKAPf5ebZf3Mp+Cab+wPo Dec 3 03:02:10 localhost certmonger[39647]: Dq6Y7R0FDav8oZmyhl6RCISkNB3DsBUL2t3+G0RbwnQIvz4wi/mIespFzwV4lrYh Dec 3 03:02:10 localhost certmonger[39647]: bdBRFATgv87nt/wTiD0q295JAAl4/lo+mDIikGVFiU/WG0FQOCpqFmv2LzGQy0Ni Dec 3 03:02:10 localhost certmonger[39647]: cZL/nlXqwskAsdJaYYnAGft3LcVyOi4pew== Dec 3 03:02:10 localhost certmonger[39647]: -----END CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[39647]: ". Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Certificate submission still ongoing. Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Certificate submission postprocessing complete. Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Child status = 0. Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Child output: Dec 3 03:02:10 localhost certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\ncZL/nlXqwskAsdJaYYnAGft3LcVyOi4pew==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:10 localhost certmonger[38965]: " Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[38965]: MIIFVTCCA72gAwIBAgIBEzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:10 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:10 localhost certmonger[38965]: MDIxMFoXDTI3MTIwNDA4MDIxMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:10 localhost certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:10 localhost certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAPhHL0KkrxoIRk+w5/qWPl6oZcavlSrMtVbY Dec 3 03:02:10 localhost certmonger[38965]: PvuvJNgcef3eYCQFfIFrqZNcctH2TPheui3cEs4zLXLxzW8wTZTUTjxAfw6HJblY Dec 3 03:02:10 localhost certmonger[38965]: Un9yCegnKtpiL3qZIdvmbu8P+9SglSFAtVmWpeXjdK6YCcQN8t1Lzs1rDUy1FNAi Dec 3 03:02:10 localhost certmonger[38965]: zXVjL+wW9eEfhj0C6YA6y3eLQfgSL+qeE8ni4J40+2eNUBV9o9WSExsUUeVB8rnR Dec 3 03:02:10 localhost certmonger[38965]: 8YWSZ85vcEg3lsT/vMNKh8GVdn1jM+uBeZWy8sEONvBcVYKeMjb1k+h/rmVI2bzS Dec 3 03:02:10 localhost certmonger[38965]: GuNZUeD1s6YCORZqeCMSeHfCkj5QbCHkim3eH25mrh97SZSyNNMCAwEAAaOCAeYw Dec 3 03:02:10 localhost certmonger[38965]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:10 localhost certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:10 localhost certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:10 localhost certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:10 localhost certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:10 localhost certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFK9JuZoBfm10ReQS8mC+f4Ni Dec 3 03:02:10 localhost certmonger[38965]: /lIcMIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28u Dec 3 03:02:10 localhost certmonger[38965]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI3LnN0b3JhZ2Vt Dec 3 03:02:10 localhost certmonger[38965]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:10 localhost certmonger[38965]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjcuc3RvcmFnZW1nbXQub29v Dec 3 03:02:10 localhost certmonger[38965]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAD6y4FG6TTW5sSvvPnb4qdFcuOnRZ0I2 Dec 3 03:02:10 localhost certmonger[38965]: O+1bk7raMU6faaYM9638x6KCK6YlkEMnH7vCAU1WFzsX3zijnWf8AgcSdrBgaF4r Dec 3 03:02:10 localhost certmonger[38965]: u/LzwRKJj7VJKfw8jXxTk8WAcfcCB3com+nD/I1KpL9x8pLV8KV1SkfLG+gx/eim Dec 3 03:02:10 localhost certmonger[38965]: XybfrlbLJTsdDB9nLihA8OKA4bPPRAkzgL33YWSycnKNqJKkeL57l6qTHws1OY21 Dec 3 03:02:10 localhost certmonger[38965]: kJb9T533ex9kGdkXGzfG0NxLH5tayWzPVXuqY/rwqZ0aaEsbLyfPMNIfPXsg9XXE Dec 3 03:02:10 localhost certmonger[38965]: 9cGOAvH+3/4OEVysBeqQgzUbnH6PfTkzRqpjLQdtHWSKKAPf5ebZf3Mp+Cab+wPo Dec 3 03:02:10 localhost certmonger[38965]: Dq6Y7R0FDav8oZmyhl6RCISkNB3DsBUL2t3+G0RbwnQIvz4wi/mIespFzwV4lrYh Dec 3 03:02:10 localhost certmonger[38965]: bdBRFATgv87nt/wTiD0q295JAAl4/lo+mDIikGVFiU/WG0FQOCpqFmv2LzGQy0Ni Dec 3 03:02:10 localhost certmonger[38965]: cZL/nlXqwskAsdJaYYnAGft3LcVyOi4pew== Dec 3 03:02:10 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:10 localhost certmonger[38965]: ". Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] No hooks set for pre-save command. Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost certmonger[39655]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Dec 3 03:02:10 localhost certmonger[38965]: 2025-12-03 08:02:10 [38965] Wrote to /var/lib/certmonger/requests/20251203080210 Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:10 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost python3[39671]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005543227.internalapi.ooo.test'] principal=['HTTP/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:11 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 03:02:11 localhost certmonger[39681]: " for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 03:02:11 localhost certmonger[39681]: " for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:11 localhost certmonger[39681]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 03:02:11 localhost certmonger[39681]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqTiNVnMs Dec 3 03:02:11 localhost certmonger[39681]: JyNWXkRoCQkkV8MpDYVOTyNs6d/JKIq4MIHAJ3HBtgvQJoFGr6TPZfFxtOxMRm0F Dec 3 03:02:11 localhost certmonger[39681]: /u71YbzS7l3ohZO90JJ60kpNCV/nVc9kDSvqlZwoFLqDtNp3Juyq+Phgb57Wotug Dec 3 03:02:11 localhost certmonger[39681]: Mr0fHi5l2MwIABnjuKPFmi8Y/ordzaBbUxGVPsGN8PQJhrmvaahKNv4X5tPFmKKo Dec 3 03:02:11 localhost certmonger[39681]: EX6BCRNdOh0Spqd7RQrAstjGPWgq7B2R9P+sskyiD1H+dGHTk/6kXjsCuQa0s12K Dec 3 03:02:11 localhost certmonger[39681]: OX/OqElRGkEIA1XV+I1OCWtKjcQS0JQRoJswpQhlnKSp8XFx8CYvkkaQtvHt/M5S Dec 3 03:02:11 localhost certmonger[39681]: FaWDPhJd0vQxewIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 03:02:11 localhost certmonger[39681]: ADAAMwAwADgAMAAyADEAMTCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Dec 3 03:02:11 localhost certmonger[39681]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 03:02:11 localhost certmonger[39681]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU0MzIyNy5pbnRlcm5h Dec 3 03:02:11 localhost certmonger[39681]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Dec 3 03:02:11 localhost certmonger[39681]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9v Dec 3 03:02:11 localhost certmonger[39681]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Dec 3 03:02:11 localhost certmonger[39681]: AjAAMB0GA1UdDgQWBBSlCPHQzwyzJFm5jY7OMX2G7WSaGjANBgkqhkiG9w0BAQsF Dec 3 03:02:11 localhost certmonger[39681]: AAOCAQEAmyPelqQ3PoSVf21eTpCwr+luLnBClhKo3T+hO/1Ws5Flyvdiyz4TJdZ9 Dec 3 03:02:11 localhost certmonger[39681]: wdR/ywsUPzz8mytSSy+w6w5N01KrQR1kFICtK2wvJ0389ALGyJUKm45seBdC6QDc Dec 3 03:02:11 localhost certmonger[39681]: CnhmrWBv7FTO339t/waW5+4//Ef+pdlOjczgoodkOkGTclSnYBBEN3q8GkJUkQg0 Dec 3 03:02:11 localhost certmonger[39681]: el4q9maZj8U2bZCchUhLAKhDzLdnLXmXnJGXEfXxmjX/JU0TrKjRflngta3RCR3b Dec 3 03:02:11 localhost certmonger[39681]: Ak03ezWXBkLrOLCyV1/LoBda3aQSP/xU2tqFuXuRgnaVk7znC+4f5TR4H+o9RbzE Dec 3 03:02:11 localhost certmonger[39681]: nJTAy1SBHeR5A+sKB9FuIiNCDhnyDA== Dec 3 03:02:11 localhost certmonger[39681]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:11 localhost certmonger[39681]: " for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqTiNVnMsJyNWXkRoCQkkV8MpDYVOTyNs6d/JKIq4MIHAJ3HBtgvQJoFGr6TPZfFxtOxMRm0F/u71YbzS7l3ohZO90JJ60kpNCV/nVc9kDSvqlZwoFLqDtNp3Juyq+Phgb57WotugMr0fHi5l2MwIABnjuKPFmi8Y/ordzaBbUxGVPsGN8PQJhrmvaahKNv4X5tPFmKKoEX6BCRNdOh0Spqd7RQrAstjGPWgq7B2R9P+sskyiD1H+dGHTk/6kXjsCuQa0s12KOX/OqElRGkEIA1XV+I1OCWtKjcQS0JQRoJswpQhlnKSp8XFx8CYvkkaQtvHt/M5SFaWDPhJd0vQxewIDAQAB" for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:11 localhost certmonger[39681]: 2025-12-03 08:02:11 [39681] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:11 localhost certmonger[38965]: 2025-12-03 08:02:11 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:11 localhost certmonger[39681]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost certmonger[39681]: Certificate: "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" Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Certificate submission still ongoing. Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Certificate submission attempt complete. Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Child status = 0. Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Child output: Dec 3 03:02:12 localhost certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[38965]: MIIFVTCCA72gAwIBAgIBFjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:12 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:12 localhost certmonger[38965]: MDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:12 localhost certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:12 localhost certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAKk4jVZzLCcjVl5EaAkJJFfDKQ2FTk8jbOnf Dec 3 03:02:12 localhost certmonger[38965]: ySiKuDCBwCdxwbYL0CaBRq+kz2XxcbTsTEZtBf7u9WG80u5d6IWTvdCSetJKTQlf Dec 3 03:02:12 localhost certmonger[38965]: 51XPZA0r6pWcKBS6g7Tadybsqvj4YG+e1qLboDK9Hx4uZdjMCAAZ47ijxZovGP6K Dec 3 03:02:12 localhost certmonger[38965]: 3c2gW1MRlT7BjfD0CYa5r2moSjb+F+bTxZiiqBF+gQkTXTodEqane0UKwLLYxj1o Dec 3 03:02:12 localhost certmonger[38965]: KuwdkfT/rLJMog9R/nRh05P+pF47ArkGtLNdijl/zqhJURpBCANV1fiNTglrSo3E Dec 3 03:02:12 localhost certmonger[38965]: EtCUEaCbMKUIZZykqfFxcfAmL5JGkLbx7fzOUhWlgz4SXdL0MXsCAwEAAaOCAeYw Dec 3 03:02:12 localhost certmonger[38965]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:12 localhost certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:12 localhost certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:12 localhost certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:12 localhost certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:12 localhost certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNkwxcQEJD4AWCwnzvO2SAkw Dec 3 03:02:12 localhost certmonger[38965]: M1j1MIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 03:02:12 localhost certmonger[38965]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI3LmludGVybmFs Dec 3 03:02:12 localhost certmonger[38965]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:12 localhost certmonger[38965]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 03:02:12 localhost certmonger[38965]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAE9nbGUJDsMYXmwqSZy87L5gGQl6o1EV Dec 3 03:02:12 localhost certmonger[38965]: Sk5HjdnMMCsj1a37nHGzd3c4l26qb/XZbmkl9yr2MkMV54pfQuuinLzpOvKz4lxl Dec 3 03:02:12 localhost certmonger[38965]: IYq5UH2XgNf8jyyaQCY6p4ure2E7Nkqvzt+k1x5mf3lZ9Z9Hh+8+lnTocv2URS73 Dec 3 03:02:12 localhost certmonger[38965]: lt8Fr166ti3Ju4j422ZOSHc+NEFioVQmjCSHXmCFFW3INDOWkHK4St2VMtGGHr0X Dec 3 03:02:12 localhost certmonger[38965]: E7onpxcAIwcb0tZxvKiCUrLCY6Q/1gs/tWCPmAO42yb/waroWpyk3oTzc6HoV6DH Dec 3 03:02:12 localhost certmonger[38965]: vKkO7WAtu+pz47xj3hJpXtOffH0qdHn0p25k1wgm2wKvWtvMyiKatv6LOt4SKNrX Dec 3 03:02:12 localhost certmonger[38965]: buafzLgZV21StbN46kqh/Nt29AM78ubGfxNwapTfFfRi56Q1DtbaL+cNN1ojg8W0 Dec 3 03:02:12 localhost certmonger[38965]: 1Q15kpn2OuZCIXNnUCs3sEwVp+Bk6IFjPAjVAJuLCPEDvmoTRk6rLF483PjzJJSg Dec 3 03:02:12 localhost certmonger[38965]: vkSkIQuklT17umgyIFmKBzFvOo6Hmq9nBg== Dec 3 03:02:12 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[38965]: " Dec 3 03:02:12 localhost certmonger[39683]: 2025-12-03 08:02:12 [39683] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39683]: MIIFVTCCA72gAwIBAgIBFjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:12 localhost certmonger[39683]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:12 localhost certmonger[39683]: MDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:12 localhost certmonger[39683]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:12 localhost certmonger[39683]: hvcNAQEBBQADggEPADCCAQoCggEBAKk4jVZzLCcjVl5EaAkJJFfDKQ2FTk8jbOnf Dec 3 03:02:12 localhost certmonger[39683]: ySiKuDCBwCdxwbYL0CaBRq+kz2XxcbTsTEZtBf7u9WG80u5d6IWTvdCSetJKTQlf Dec 3 03:02:12 localhost certmonger[39683]: 51XPZA0r6pWcKBS6g7Tadybsqvj4YG+e1qLboDK9Hx4uZdjMCAAZ47ijxZovGP6K Dec 3 03:02:12 localhost certmonger[39683]: 3c2gW1MRlT7BjfD0CYa5r2moSjb+F+bTxZiiqBF+gQkTXTodEqane0UKwLLYxj1o Dec 3 03:02:12 localhost certmonger[39683]: KuwdkfT/rLJMog9R/nRh05P+pF47ArkGtLNdijl/zqhJURpBCANV1fiNTglrSo3E Dec 3 03:02:12 localhost certmonger[39683]: EtCUEaCbMKUIZZykqfFxcfAmL5JGkLbx7fzOUhWlgz4SXdL0MXsCAwEAAaOCAeYw Dec 3 03:02:12 localhost certmonger[39683]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:12 localhost certmonger[39683]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:12 localhost certmonger[39683]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:12 localhost certmonger[39683]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:12 localhost certmonger[39683]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:12 localhost certmonger[39683]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNkwxcQEJD4AWCwnzvO2SAkw Dec 3 03:02:12 localhost certmonger[39683]: M1j1MIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 03:02:12 localhost certmonger[39683]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI3LmludGVybmFs Dec 3 03:02:12 localhost certmonger[39683]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:12 localhost certmonger[39683]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 03:02:12 localhost certmonger[39683]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAE9nbGUJDsMYXmwqSZy87L5gGQl6o1EV Dec 3 03:02:12 localhost certmonger[39683]: Sk5HjdnMMCsj1a37nHGzd3c4l26qb/XZbmkl9yr2MkMV54pfQuuinLzpOvKz4lxl Dec 3 03:02:12 localhost certmonger[39683]: IYq5UH2XgNf8jyyaQCY6p4ure2E7Nkqvzt+k1x5mf3lZ9Z9Hh+8+lnTocv2URS73 Dec 3 03:02:12 localhost certmonger[39683]: lt8Fr166ti3Ju4j422ZOSHc+NEFioVQmjCSHXmCFFW3INDOWkHK4St2VMtGGHr0X Dec 3 03:02:12 localhost certmonger[39683]: E7onpxcAIwcb0tZxvKiCUrLCY6Q/1gs/tWCPmAO42yb/waroWpyk3oTzc6HoV6DH Dec 3 03:02:12 localhost certmonger[39683]: vKkO7WAtu+pz47xj3hJpXtOffH0qdHn0p25k1wgm2wKvWtvMyiKatv6LOt4SKNrX Dec 3 03:02:12 localhost certmonger[39683]: buafzLgZV21StbN46kqh/Nt29AM78ubGfxNwapTfFfRi56Q1DtbaL+cNN1ojg8W0 Dec 3 03:02:12 localhost certmonger[39683]: 1Q15kpn2OuZCIXNnUCs3sEwVp+Bk6IFjPAjVAJuLCPEDvmoTRk6rLF483PjzJJSg Dec 3 03:02:12 localhost certmonger[39683]: vkSkIQuklT17umgyIFmKBzFvOo6Hmq9nBg== Dec 3 03:02:12 localhost certmonger[39683]: -----END CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[39683]: ". Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Certificate submission still ongoing. Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Certificate submission postprocessing complete. Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Child status = 0. Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Child output: Dec 3 03:02:12 localhost certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nvkSkIQuklT17umgyIFmKBzFvOo6Hmq9nBg==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:12 localhost certmonger[38965]: " Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[38965]: MIIFVTCCA72gAwIBAgIBFjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:12 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:12 localhost certmonger[38965]: MDIxMloXDTI3MTIwNDA4MDIxMlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 03:02:12 localhost certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 03:02:12 localhost certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAKk4jVZzLCcjVl5EaAkJJFfDKQ2FTk8jbOnf Dec 3 03:02:12 localhost certmonger[38965]: ySiKuDCBwCdxwbYL0CaBRq+kz2XxcbTsTEZtBf7u9WG80u5d6IWTvdCSetJKTQlf Dec 3 03:02:12 localhost certmonger[38965]: 51XPZA0r6pWcKBS6g7Tadybsqvj4YG+e1qLboDK9Hx4uZdjMCAAZ47ijxZovGP6K Dec 3 03:02:12 localhost certmonger[38965]: 3c2gW1MRlT7BjfD0CYa5r2moSjb+F+bTxZiiqBF+gQkTXTodEqane0UKwLLYxj1o Dec 3 03:02:12 localhost certmonger[38965]: KuwdkfT/rLJMog9R/nRh05P+pF47ArkGtLNdijl/zqhJURpBCANV1fiNTglrSo3E Dec 3 03:02:12 localhost certmonger[38965]: EtCUEaCbMKUIZZykqfFxcfAmL5JGkLbx7fzOUhWlgz4SXdL0MXsCAwEAAaOCAeYw Dec 3 03:02:12 localhost certmonger[38965]: ggHiMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 03:02:12 localhost certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 03:02:12 localhost certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 03:02:12 localhost certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 03:02:12 localhost certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 03:02:12 localhost certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNkwxcQEJD4AWCwnzvO2SAkw Dec 3 03:02:12 localhost certmonger[38965]: M1j1MIG/BgNVHREEgbcwgbSCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 03:02:12 localhost certmonger[38965]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTQzMjI3LmludGVybmFs Dec 3 03:02:12 localhost certmonger[38965]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Dec 3 03:02:12 localhost certmonger[38965]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 03:02:12 localhost certmonger[38965]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAE9nbGUJDsMYXmwqSZy87L5gGQl6o1EV Dec 3 03:02:12 localhost certmonger[38965]: Sk5HjdnMMCsj1a37nHGzd3c4l26qb/XZbmkl9yr2MkMV54pfQuuinLzpOvKz4lxl Dec 3 03:02:12 localhost certmonger[38965]: IYq5UH2XgNf8jyyaQCY6p4ure2E7Nkqvzt+k1x5mf3lZ9Z9Hh+8+lnTocv2URS73 Dec 3 03:02:12 localhost certmonger[38965]: lt8Fr166ti3Ju4j422ZOSHc+NEFioVQmjCSHXmCFFW3INDOWkHK4St2VMtGGHr0X Dec 3 03:02:12 localhost certmonger[38965]: E7onpxcAIwcb0tZxvKiCUrLCY6Q/1gs/tWCPmAO42yb/waroWpyk3oTzc6HoV6DH Dec 3 03:02:12 localhost certmonger[38965]: vKkO7WAtu+pz47xj3hJpXtOffH0qdHn0p25k1wgm2wKvWtvMyiKatv6LOt4SKNrX Dec 3 03:02:12 localhost certmonger[38965]: buafzLgZV21StbN46kqh/Nt29AM78ubGfxNwapTfFfRi56Q1DtbaL+cNN1ojg8W0 Dec 3 03:02:12 localhost certmonger[38965]: 1Q15kpn2OuZCIXNnUCs3sEwVp+Bk6IFjPAjVAJuLCPEDvmoTRk6rLF483PjzJJSg Dec 3 03:02:12 localhost certmonger[38965]: vkSkIQuklT17umgyIFmKBzFvOo6Hmq9nBg== Dec 3 03:02:12 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:12 localhost certmonger[38965]: ". Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] No hooks set for pre-save command. Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost certmonger[39691]: Certificate in file "/etc/pki/tls/certs/httpd-internal_api.crt" issued by CA and saved. Dec 3 03:02:12 localhost certmonger[38965]: 2025-12-03 08:02:12 [38965] Wrote to /var/lib/certmonger/requests/20251203080211 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:12 localhost python3[39707]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005543227.external.ooo.test'] principal=['HTTP/np0005543227.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:12 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.external.ooo.test" for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.external.ooo.test Dec 3 03:02:13 localhost certmonger[39717]: " for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005543227.external.ooo.test@OOO.TEST Dec 3 03:02:13 localhost certmonger[39717]: " for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 03:02:13 localhost certmonger[39717]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTQzMjI3LmV4dGVybmFsLm9v Dec 3 03:02:13 localhost certmonger[39717]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAysectxUC3Jaq Dec 3 03:02:13 localhost certmonger[39717]: XHFZ/cbMBfo9cqo7DxbeIA6FiDw9nV2K46Fe2vnNOacwmS/+k+pKkHwGnViWK832 Dec 3 03:02:13 localhost certmonger[39717]: jvuQnGak7VckLNHQReeng6Bt9S4M/WsgMZdmOO0e9q/LxV7KzJgS1JGOoO5X3Abt Dec 3 03:02:13 localhost certmonger[39717]: 2IMMkvuuWrp8gbjxmEl/7d9nwWBqlgfynRlRHO31vtdlxeAY8NRBJQ+XFTLtq3+h Dec 3 03:02:13 localhost certmonger[39717]: h1kgz/wCQKf4qgvHvwK/msIGhbd/68siBCMtTOlRaKdN5AUoN1keH49iTx3J1mW8 Dec 3 03:02:13 localhost certmonger[39717]: Rwd3AQBkf801w/U+JXz+dlCoSNbyscssR5KFX3rPNCugPaKuXQm4l2iBC3FrWlUc Dec 3 03:02:13 localhost certmonger[39717]: nODbIpX3mQIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAA Dec 3 03:02:13 localhost certmonger[39717]: MwAwADgAMAAyADEAMzCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Dec 3 03:02:13 localhost certmonger[39717]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1NDMyMjcuZXh0ZXJuYWwub29vLnRlc3Sg Dec 3 03:02:13 localhost certmonger[39717]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU0MzIyNy5leHRlcm5hbC5vb28u Dec 3 03:02:13 localhost certmonger[39717]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Dec 3 03:02:13 localhost certmonger[39717]: oSgwJhsESFRUUBsebnAwMDA1NTQzMjI3LmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Dec 3 03:02:13 localhost certmonger[39717]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Dec 3 03:02:13 localhost certmonger[39717]: BBSlCPHQzwyzJFm5jY7OMX2G7WSaGjANBgkqhkiG9w0BAQsFAAOCAQEAdpOvhXQT Dec 3 03:02:13 localhost certmonger[39717]: vhrepWdLpSy4GZ6UhWUNecICMVHnm2BuQwNU8OgqenarPSYnWwTa2qkozFANKAdB Dec 3 03:02:13 localhost certmonger[39717]: eHAtPjgDHaaeK/BnV6BepvgVy+PzbTpCTCPdIueA69qA8M1R/I7xxWhV9mbL215w Dec 3 03:02:13 localhost certmonger[39717]: T+jr/LtyR5L/jyd5YRXaOkDFmjpHPeeuYqSeN38mCFuid/64MTVIDSz4YQ1QkaLt Dec 3 03:02:13 localhost certmonger[39717]: KWbu8JXrzn0df2GdQ0B0Q75jZ9wNW6wr2dD7sosHfF/z1YR5XtTX3XDkDJnLG3C0 Dec 3 03:02:13 localhost certmonger[39717]: buAWor5p7Bou1ZPFJ8nq2JxhrZzt73BAsr812/QV3jDuZaeGIkzxFPdTTP3TingK Dec 3 03:02:13 localhost certmonger[39717]: IwtlJLp4shSLXg== Dec 3 03:02:13 localhost certmonger[39717]: -----END CERTIFICATE REQUEST----- Dec 3 03:02:13 localhost certmonger[39717]: " for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAysectxUC3JaqXHFZ/cbMBfo9cqo7DxbeIA6FiDw9nV2K46Fe2vnNOacwmS/+k+pKkHwGnViWK832jvuQnGak7VckLNHQReeng6Bt9S4M/WsgMZdmOO0e9q/LxV7KzJgS1JGOoO5X3Abt2IMMkvuuWrp8gbjxmEl/7d9nwWBqlgfynRlRHO31vtdlxeAY8NRBJQ+XFTLtq3+hh1kgz/wCQKf4qgvHvwK/msIGhbd/68siBCMtTOlRaKdN5AUoN1keH49iTx3J1mW8Rwd3AQBkf801w/U+JXz+dlCoSNbyscssR5KFX3rPNCugPaKuXQm4l2iBC3FrWlUcnODbIpX3mQIDAQAB" for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:13 localhost certmonger[39717]: 2025-12-03 08:02:13 [39717] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[39717]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost certmonger[39717]: Certificate: "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" Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Certificate submission still ongoing. Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Certificate submission attempt complete. Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Child status = 0. Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Child output: Dec 3 03:02:13 localhost certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[38965]: MIIFSTCCA7GgAwIBAgIBGjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:13 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:13 localhost certmonger[38965]: MDIxM1oXDTI3MTIwNDA4MDIxM1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:13 localhost certmonger[38965]: BAMMHm5wMDAwNTU0MzIyNy5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:13 localhost certmonger[38965]: AQEBBQADggEPADCCAQoCggEBAMrHnLcVAtyWqlxxWf3GzAX6PXKqOw8W3iAOhYg8 Dec 3 03:02:13 localhost certmonger[38965]: PZ1diuOhXtr5zTmnMJkv/pPqSpB8Bp1YlivN9o77kJxmpO1XJCzR0EXnp4OgbfUu Dec 3 03:02:13 localhost certmonger[38965]: DP1rIDGXZjjtHvavy8VeysyYEtSRjqDuV9wG7diDDJL7rlq6fIG48ZhJf+3fZ8Fg Dec 3 03:02:13 localhost certmonger[38965]: apYH8p0ZURzt9b7XZcXgGPDUQSUPlxUy7at/oYdZIM/8AkCn+KoLx78Cv5rCBoW3 Dec 3 03:02:13 localhost certmonger[38965]: f+vLIgQjLUzpUWinTeQFKDdZHh+PYk8dydZlvEcHdwEAZH/NNcP1PiV8/nZQqEjW Dec 3 03:02:13 localhost certmonger[38965]: 8rHLLEeShV96zzQroD2irl0JuJdogQtxa1pVHJzg2yKV95kCAwEAAaOCAd0wggHZ Dec 3 03:02:13 localhost certmonger[38965]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:13 localhost certmonger[38965]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:13 localhost certmonger[38965]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:13 localhost certmonger[38965]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:13 localhost certmonger[38965]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:13 localhost certmonger[38965]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFCVYNQAhcXErG6+06k7W1hsdn04 Dec 3 03:02:13 localhost certmonger[38965]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNy5leHRlcm5hbC5vb28udGVzdKA8 Dec 3 03:02:13 localhost certmonger[38965]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI3LmV4dGVybmFsLm9vby50 Dec 3 03:02:13 localhost certmonger[38965]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:13 localhost certmonger[38965]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjcuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Dec 3 03:02:13 localhost certmonger[38965]: hvcNAQELBQADggGBAIpPGRFM8wy3HYRYNbECkWuuYNKBX/gtCQ8sXvTFitOu6nNX Dec 3 03:02:13 localhost certmonger[38965]: 6eskUnuvwBGrQ0ShiE0eaS9YDnWZ5viTOF7Gb+ZmuF/MTQSBcGC3fcGHAN0SVByz Dec 3 03:02:13 localhost certmonger[38965]: v2fK4sebj5yU0WurKw5MSK/fw+bpGpD9Ot1p+oCxLjo+mCfNxWHYEmiPk/xYQtBX Dec 3 03:02:13 localhost certmonger[38965]: s9T0yfsWhmC1tukMjlDN4plXyWlHcKRUQ5qXj9TKAlfjsKpJvONiWLOZWZTw02hz Dec 3 03:02:13 localhost certmonger[38965]: K+fSegnEIc86cMJw19rf4Hiexc8q8NfpAg3JhyFF6yUNmrB8A6GchiEpoUFFjhuI Dec 3 03:02:13 localhost certmonger[38965]: Qagdpq8YH+KUdSzghHFgB97tkXOpRGnf5MKiL4Sg35BhZCAUcO1ykoXgyakioF73 Dec 3 03:02:13 localhost certmonger[38965]: Q2B/OFWHgnSDwO0vozF8zvygiKOcTRXVXzKXqTDBVQXaLbqOYJMhzAyYa7tQV8Jq Dec 3 03:02:13 localhost certmonger[38965]: H+OHow0PFGA3eDAy7QolJEc57FVNcwPkZtdibEqEzYojtXlNHZnYzQEOHQ4I7T1W Dec 3 03:02:13 localhost certmonger[38965]: lX8Jx4NZRVbezcl06A== Dec 3 03:02:13 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[38965]: " Dec 3 03:02:13 localhost certmonger[39719]: 2025-12-03 08:02:13 [39719] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39719]: MIIFSTCCA7GgAwIBAgIBGjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:13 localhost certmonger[39719]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:13 localhost certmonger[39719]: MDIxM1oXDTI3MTIwNDA4MDIxM1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:13 localhost certmonger[39719]: BAMMHm5wMDAwNTU0MzIyNy5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:13 localhost certmonger[39719]: AQEBBQADggEPADCCAQoCggEBAMrHnLcVAtyWqlxxWf3GzAX6PXKqOw8W3iAOhYg8 Dec 3 03:02:13 localhost certmonger[39719]: PZ1diuOhXtr5zTmnMJkv/pPqSpB8Bp1YlivN9o77kJxmpO1XJCzR0EXnp4OgbfUu Dec 3 03:02:13 localhost certmonger[39719]: DP1rIDGXZjjtHvavy8VeysyYEtSRjqDuV9wG7diDDJL7rlq6fIG48ZhJf+3fZ8Fg Dec 3 03:02:13 localhost certmonger[39719]: apYH8p0ZURzt9b7XZcXgGPDUQSUPlxUy7at/oYdZIM/8AkCn+KoLx78Cv5rCBoW3 Dec 3 03:02:13 localhost certmonger[39719]: f+vLIgQjLUzpUWinTeQFKDdZHh+PYk8dydZlvEcHdwEAZH/NNcP1PiV8/nZQqEjW Dec 3 03:02:13 localhost certmonger[39719]: 8rHLLEeShV96zzQroD2irl0JuJdogQtxa1pVHJzg2yKV95kCAwEAAaOCAd0wggHZ Dec 3 03:02:13 localhost certmonger[39719]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:13 localhost certmonger[39719]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:13 localhost certmonger[39719]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:13 localhost certmonger[39719]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:13 localhost certmonger[39719]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:13 localhost certmonger[39719]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFCVYNQAhcXErG6+06k7W1hsdn04 Dec 3 03:02:13 localhost certmonger[39719]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNy5leHRlcm5hbC5vb28udGVzdKA8 Dec 3 03:02:13 localhost certmonger[39719]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI3LmV4dGVybmFsLm9vby50 Dec 3 03:02:13 localhost certmonger[39719]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:13 localhost certmonger[39719]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjcuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Dec 3 03:02:13 localhost certmonger[39719]: hvcNAQELBQADggGBAIpPGRFM8wy3HYRYNbECkWuuYNKBX/gtCQ8sXvTFitOu6nNX Dec 3 03:02:13 localhost certmonger[39719]: 6eskUnuvwBGrQ0ShiE0eaS9YDnWZ5viTOF7Gb+ZmuF/MTQSBcGC3fcGHAN0SVByz Dec 3 03:02:13 localhost certmonger[39719]: v2fK4sebj5yU0WurKw5MSK/fw+bpGpD9Ot1p+oCxLjo+mCfNxWHYEmiPk/xYQtBX Dec 3 03:02:13 localhost certmonger[39719]: s9T0yfsWhmC1tukMjlDN4plXyWlHcKRUQ5qXj9TKAlfjsKpJvONiWLOZWZTw02hz Dec 3 03:02:13 localhost certmonger[39719]: K+fSegnEIc86cMJw19rf4Hiexc8q8NfpAg3JhyFF6yUNmrB8A6GchiEpoUFFjhuI Dec 3 03:02:13 localhost certmonger[39719]: Qagdpq8YH+KUdSzghHFgB97tkXOpRGnf5MKiL4Sg35BhZCAUcO1ykoXgyakioF73 Dec 3 03:02:13 localhost certmonger[39719]: Q2B/OFWHgnSDwO0vozF8zvygiKOcTRXVXzKXqTDBVQXaLbqOYJMhzAyYa7tQV8Jq Dec 3 03:02:13 localhost certmonger[39719]: H+OHow0PFGA3eDAy7QolJEc57FVNcwPkZtdibEqEzYojtXlNHZnYzQEOHQ4I7T1W Dec 3 03:02:13 localhost certmonger[39719]: lX8Jx4NZRVbezcl06A== Dec 3 03:02:13 localhost certmonger[39719]: -----END CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[39719]: ". Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Certificate submission still ongoing. Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Certificate submission postprocessing complete. Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Child status = 0. Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Child output: Dec 3 03:02:13 localhost certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nlX8Jx4NZRVbezcl06A==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 03:02:13 localhost certmonger[38965]: " Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[38965]: MIIFSTCCA7GgAwIBAgIBGjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 03:02:13 localhost certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 03:02:13 localhost certmonger[38965]: MDIxM1oXDTI3MTIwNDA4MDIxM1owPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 03:02:13 localhost certmonger[38965]: BAMMHm5wMDAwNTU0MzIyNy5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 03:02:13 localhost certmonger[38965]: AQEBBQADggEPADCCAQoCggEBAMrHnLcVAtyWqlxxWf3GzAX6PXKqOw8W3iAOhYg8 Dec 3 03:02:13 localhost certmonger[38965]: PZ1diuOhXtr5zTmnMJkv/pPqSpB8Bp1YlivN9o77kJxmpO1XJCzR0EXnp4OgbfUu Dec 3 03:02:13 localhost certmonger[38965]: DP1rIDGXZjjtHvavy8VeysyYEtSRjqDuV9wG7diDDJL7rlq6fIG48ZhJf+3fZ8Fg Dec 3 03:02:13 localhost certmonger[38965]: apYH8p0ZURzt9b7XZcXgGPDUQSUPlxUy7at/oYdZIM/8AkCn+KoLx78Cv5rCBoW3 Dec 3 03:02:13 localhost certmonger[38965]: f+vLIgQjLUzpUWinTeQFKDdZHh+PYk8dydZlvEcHdwEAZH/NNcP1PiV8/nZQqEjW Dec 3 03:02:13 localhost certmonger[38965]: 8rHLLEeShV96zzQroD2irl0JuJdogQtxa1pVHJzg2yKV95kCAwEAAaOCAd0wggHZ Dec 3 03:02:13 localhost certmonger[38965]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 03:02:13 localhost certmonger[38965]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 03:02:13 localhost certmonger[38965]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 03:02:13 localhost certmonger[38965]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 03:02:13 localhost certmonger[38965]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 03:02:13 localhost certmonger[38965]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFCVYNQAhcXErG6+06k7W1hsdn04 Dec 3 03:02:13 localhost certmonger[38965]: MIG2BgNVHREEga4wgauCHm5wMDAwNTU0MzIyNy5leHRlcm5hbC5vb28udGVzdKA8 Dec 3 03:02:13 localhost certmonger[38965]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTQzMjI3LmV4dGVybmFsLm9vby50 Dec 3 03:02:13 localhost certmonger[38965]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Dec 3 03:02:13 localhost certmonger[38965]: KDAmGwRIVFRQGx5ucDAwMDU1NDMyMjcuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Dec 3 03:02:13 localhost certmonger[38965]: hvcNAQELBQADggGBAIpPGRFM8wy3HYRYNbECkWuuYNKBX/gtCQ8sXvTFitOu6nNX Dec 3 03:02:13 localhost certmonger[38965]: 6eskUnuvwBGrQ0ShiE0eaS9YDnWZ5viTOF7Gb+ZmuF/MTQSBcGC3fcGHAN0SVByz Dec 3 03:02:13 localhost certmonger[38965]: v2fK4sebj5yU0WurKw5MSK/fw+bpGpD9Ot1p+oCxLjo+mCfNxWHYEmiPk/xYQtBX Dec 3 03:02:13 localhost certmonger[38965]: s9T0yfsWhmC1tukMjlDN4plXyWlHcKRUQ5qXj9TKAlfjsKpJvONiWLOZWZTw02hz Dec 3 03:02:13 localhost certmonger[38965]: K+fSegnEIc86cMJw19rf4Hiexc8q8NfpAg3JhyFF6yUNmrB8A6GchiEpoUFFjhuI Dec 3 03:02:13 localhost certmonger[38965]: Qagdpq8YH+KUdSzghHFgB97tkXOpRGnf5MKiL4Sg35BhZCAUcO1ykoXgyakioF73 Dec 3 03:02:13 localhost certmonger[38965]: Q2B/OFWHgnSDwO0vozF8zvygiKOcTRXVXzKXqTDBVQXaLbqOYJMhzAyYa7tQV8Jq Dec 3 03:02:13 localhost certmonger[38965]: H+OHow0PFGA3eDAy7QolJEc57FVNcwPkZtdibEqEzYojtXlNHZnYzQEOHQ4I7T1W Dec 3 03:02:13 localhost certmonger[38965]: lX8Jx4NZRVbezcl06A== Dec 3 03:02:13 localhost certmonger[38965]: -----END CERTIFICATE----- Dec 3 03:02:13 localhost certmonger[38965]: ". Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] No hooks set for pre-save command. Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost certmonger[39727]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Dec 3 03:02:13 localhost certmonger[38965]: 2025-12-03 08:02:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080213 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:13 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost python3[39743]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d29bb0aa-dc9e-4eb8-900a-af942433ce05 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ffa2a98c-7856-4f4f-bc59-426b9edb253f Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:14 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f5ca731-0d27-484b-a7db-550161fae6f8 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 99de0e07-5037-4bd5-88f2-60b8e9f37a11 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d29bb0aa-dc9e-4eb8-900a-af942433ce05 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 65985660-59d4-4c17-8de9-7f8c7d7f59f2 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3dba083b-3c3c-4271-b27c-80f7fdd72343 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0424803d-91ea-45d6-b8d0-0aae0fa9686f Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26415ce3-8b9e-41ee-95b5-d8b28ea8b315 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68a2302b-7cb0-46d1-ae7d-9fcc7416a624 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68a2302b-7cb0-46d1-ae7d-9fcc7416a624 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dc81f2b5-92c5-4d6a-8887-c043530048cc Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 65985660-59d4-4c17-8de9-7f8c7d7f59f2 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 19df03ca-8958-4ccb-9a46-e312d85dc9e9 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:15 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:16 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:17 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost kernel: VFS: idmapped mount is not enabled. Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost sedispatch[724]: AVC Message regarding setroubleshoot, ignoring message Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:18 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:19 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:20 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost auditd[722]: Error receiving audit netlink packet (No buffer space available) Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:21 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dc0d9e5-68f4-448c-8354-5ef18b046dcf Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6970dc51-deae-4965-8158-fbc97a0d431d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e640f1eb-1e89-4cef-a372-078c3d45e903 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:22 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:23 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d29bb0aa-dc9e-4eb8-900a-af942433ce05 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ffa2a98c-7856-4f4f-bc59-426b9edb253f Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f5ca731-0d27-484b-a7db-550161fae6f8 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 99de0e07-5037-4bd5-88f2-60b8e9f37a11 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d29bb0aa-dc9e-4eb8-900a-af942433ce05 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 65985660-59d4-4c17-8de9-7f8c7d7f59f2 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3dba083b-3c3c-4271-b27c-80f7fdd72343 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0424803d-91ea-45d6-b8d0-0aae0fa9686f Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26415ce3-8b9e-41ee-95b5-d8b28ea8b315 Dec 3 03:02:24 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68a2302b-7cb0-46d1-ae7d-9fcc7416a624 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68a2302b-7cb0-46d1-ae7d-9fcc7416a624 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dc81f2b5-92c5-4d6a-8887-c043530048cc Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 65985660-59d4-4c17-8de9-7f8c7d7f59f2 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 19df03ca-8958-4ccb-9a46-e312d85dc9e9 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:25 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:26 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d29bb0aa-dc9e-4eb8-900a-af942433ce05 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ffa2a98c-7856-4f4f-bc59-426b9edb253f Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f5ca731-0d27-484b-a7db-550161fae6f8 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 99de0e07-5037-4bd5-88f2-60b8e9f37a11 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 65985660-59d4-4c17-8de9-7f8c7d7f59f2 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 19df03ca-8958-4ccb-9a46-e312d85dc9e9 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:27 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:28 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dc0d9e5-68f4-448c-8354-5ef18b046dcf Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6970dc51-deae-4965-8158-fbc97a0d431d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b1fdb9e6-1a4f-4712-bb80-565813ee24c0 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:29 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d29bb0aa-dc9e-4eb8-900a-af942433ce05 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ffa2a98c-7856-4f4f-bc59-426b9edb253f Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f5ca731-0d27-484b-a7db-550161fae6f8 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 99de0e07-5037-4bd5-88f2-60b8e9f37a11 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d29bb0aa-dc9e-4eb8-900a-af942433ce05 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 65985660-59d4-4c17-8de9-7f8c7d7f59f2 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3dba083b-3c3c-4271-b27c-80f7fdd72343 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0424803d-91ea-45d6-b8d0-0aae0fa9686f Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26415ce3-8b9e-41ee-95b5-d8b28ea8b315 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68a2302b-7cb0-46d1-ae7d-9fcc7416a624 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68a2302b-7cb0-46d1-ae7d-9fcc7416a624 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dc81f2b5-92c5-4d6a-8887-c043530048cc Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 65985660-59d4-4c17-8de9-7f8c7d7f59f2 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 19df03ca-8958-4ccb-9a46-e312d85dc9e9 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:30 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost podman[39744]: 2025-12-03 08:02:14.431388543 +0000 UTC m=+0.039828592 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Dec 3 03:02:31 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost sedispatch[724]: AVC Message regarding setroubleshoot, ignoring message Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost python3[39989]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 cluster.common.tag/cinder-backup:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost podman[39990]: 2025-12-03 08:02:31.806310387 +0000 UTC m=+0.052210992 image tag 01162f309a727f9f16ef893d348a6167be101f9c31f2a9a381f4a430ffc3b21a cluster.common.tag/cinder-backup:pcmklatest Dec 3 03:02:31 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6f5ca731-0d27-484b-a7db-550161fae6f8 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l cae44d2c-1ce3-4522-8a61-6753542c6fe4 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ae0ef1d5-b71c-4c3c-b550-a57ec205a135 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 99de0e07-5037-4bd5-88f2-60b8e9f37a11 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d29bb0aa-dc9e-4eb8-900a-af942433ce05 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 65985660-59d4-4c17-8de9-7f8c7d7f59f2 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3dba083b-3c3c-4271-b27c-80f7fdd72343 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 0424803d-91ea-45d6-b8d0-0aae0fa9686f Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 26415ce3-8b9e-41ee-95b5-d8b28ea8b315 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68a2302b-7cb0-46d1-ae7d-9fcc7416a624 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 68a2302b-7cb0-46d1-ae7d-9fcc7416a624 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dc81f2b5-92c5-4d6a-8887-c043530048cc Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 65985660-59d4-4c17-8de9-7f8c7d7f59f2 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 19df03ca-8958-4ccb-9a46-e312d85dc9e9 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a17d2762-4611-4042-836a-c8a59e7cb0c5 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 49fdfe65-0a44-492a-89b9-ff695393f82f Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:31 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost python3[40016]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:32 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 4dc0d9e5-68f4-448c-8354-5ef18b046dcf Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6970dc51-deae-4965-8158-fbc97a0d431d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l e640f1eb-1e89-4cef-a372-078c3d45e903 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l aceeeab1-54f8-4f7b-be94-a7f793e781c2 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23ddebad-9d9f-4a41-90fb-0943a4c1896e Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d7f211b0-0666-4085-b5a2-a67e75522f2d Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b1fdb9e6-1a4f-4712-bb80-565813ee24c0 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5114cc9f-1d48-404e-a74e-194cdea67d35 Dec 3 03:02:33 localhost setroubleshoot[39578]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Dec 3 03:02:37 localhost podman[40017]: 2025-12-03 08:02:32.438835542 +0000 UTC m=+0.047088425 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Dec 3 03:02:37 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:02:37 localhost python3[40083]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 cluster.common.tag/cinder-volume:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:37 localhost podman[40084]: 2025-12-03 08:02:37.496911838 +0000 UTC m=+0.044694031 image tag ccd22ddeb69c8f3a05d2d3f97d21f9fa64c6f2bc3a156f93212de7feacea314f cluster.common.tag/cinder-volume:pcmklatest Dec 3 03:02:37 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 03:02:38 localhost python3[40111]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 03:02:39 localhost python3[40128]: ansible-blockinfile Invoked with content=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 create=True path=/etc/rsyslog.d/openstack-haproxy.conf block=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:02:40 np0005543227 python3[40144]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 08:02:40 np0005543227 systemd[1]: Stopping System Logging Service... Dec 3 08:02:40 np0005543227 rsyslogd[759]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="759" x-info="https://www.rsyslog.com"] exiting on signal 15. Dec 3 08:02:40 np0005543227 systemd[1]: rsyslog.service: Deactivated successfully. Dec 3 08:02:40 np0005543227 systemd[1]: Stopped System Logging Service. Dec 3 08:02:40 np0005543227 systemd[1]: rsyslog.service: Consumed 1.503s CPU time, read 920.0K from disk, written 3.9M to disk. Dec 3 08:02:40 np0005543227 systemd[1]: Starting System Logging Service... Dec 3 08:02:40 np0005543227 rsyslogd[40147]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40147" x-info="https://www.rsyslog.com"] start Dec 3 08:02:40 np0005543227 systemd[1]: Started System Logging Service. Dec 3 08:02:40 np0005543227 rsyslogd[40147]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 08:02:41 np0005543227 python3[40166]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:02:43 np0005543227 systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Dec 3 08:02:43 np0005543227 systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 2.132s CPU time. Dec 3 08:02:43 np0005543227 systemd[1]: setroubleshootd.service: Deactivated successfully. Dec 3 08:02:43 np0005543227 systemd[1]: setroubleshootd.service: Consumed 22.674s CPU time. Dec 3 08:02:45 np0005543227 podman[40167]: 2025-12-03 08:02:41.092746458 +0000 UTC m=+0.032104916 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Dec 3 08:02:45 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:02:46 np0005543227 python3[40233]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 cluster.common.tag/haproxy:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:02:46 np0005543227 podman[40234]: 2025-12-03 08:02:46.059930317 +0000 UTC m=+0.046632112 image tag bc0fbe6b9534c6b74951010de79a1ae57713cd63ed3f582d78ca1561a7041088 cluster.common.tag/haproxy:pcmklatest Dec 3 08:02:46 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:02:46 np0005543227 python3[40261]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:02:49 np0005543227 python3[40278]: ansible-systemd Invoked with enabled=True masked=False name=certmonger.service state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None Dec 3 08:02:49 np0005543227 python3[40297]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 08:02:50 np0005543227 python3[40313]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 08:02:50 np0005543227 python3[40329]: ansible-ansible.legacy.command Invoked with _raw_params=set -e#012ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012chmod 0644 ${ca_pem}#012update-ca-trust extract#012test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:02:52 np0005543227 python3[40355]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:02:52 np0005543227 python3[40375]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:02:55 np0005543227 python3[40649]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:00 np0005543227 python3[40689]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:01 np0005543227 python3[40899]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:01 np0005543227 python3[40915]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:03:02 np0005543227 python3[40933]: ansible-certificate_request Invoked with name=haproxy-external-cert dns=['overcloud.ooo.test'] ip=[] principal=['haproxy/overcloud.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-external-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012cp "/etc/pki/tls/private/haproxy-external-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012#012ca_type=ipa#012if [ "$ca_type" = "self-sign" ]; then#012 # refresh the ca cert just in case the ca cert has been renewed#012 ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012 openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012 chmod 0644 ${ca_pem}#012 update-ca-trust extract#012 test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 openssl x509 -in ${ca_pem} -out /tmp/cm-local-ca.pem#012 ca_path="/tmp/cm-local-ca.pem"#012else#012 ca_path="/etc/ipa/ca.crt"#012fi#012#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012service_pem="/etc/pki/tls/private/overcloud_endpoint.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:02 np0005543227 certmonger[38965]: 2025-12-03 08:03:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_REQ_SUBJECT" to "CN=overcloud.ooo.test" for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_REQ_HOSTNAME" to "overcloud.ooo.test Dec 3 08:03:03 np0005543227 certmonger[40943]: " for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/overcloud.ooo.test@OOO.TEST Dec 3 08:03:03 np0005543227 certmonger[40943]: " for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:03 np0005543227 certmonger[40943]: MIIDmjCCAoICAQAwHTEbMBkGA1UEAxMSb3ZlcmNsb3VkLm9vby50ZXN0MIIBIjAN Dec 3 08:03:03 np0005543227 certmonger[40943]: BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6azsgU5e5gRxKisMoYKdP6VL0GxR Dec 3 08:03:03 np0005543227 certmonger[40943]: KvX6TSsAZKSg01JsZNH5ycrse6J7oMMHRmsc31OmJlR7uYEnADWqEujqwe//cITW Dec 3 08:03:03 np0005543227 certmonger[40943]: J4NnTMal06gB+iakTSs7tpMV+cL232I9HSqYuDNffy57f0BEN1j5TD/U0eukFv1d Dec 3 08:03:03 np0005543227 certmonger[40943]: SihK44wE1etIIBL3KaaT75nqaYO+ix58oePPPtnpOr04iikdU1D/Zgcnf95yaWHh Dec 3 08:03:03 np0005543227 certmonger[40943]: +JAVvsJ6GiM8iX9BG+obOE0JuZdIfyCoqrEQeOa+1yAI34UNZeGSCQfs386Y6Vxq Dec 3 08:03:03 np0005543227 certmonger[40943]: aQIulIfJ3hJwnie2EoIXCMjSfrqc0PGojCt1ALTQgzq55QmNISrEoHEvaQIDAQAB Dec 3 08:03:03 np0005543227 certmonger[40943]: oIIBNjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAAMwAwADgAMAAzADAA Dec 3 08:03:03 np0005543227 certmonger[40943]: MjCCAQUGCSqGSIb3DQEJDjGB9zCB9DALBgNVHQ8EBAMCBaAwgZgGA1UdEQSBkDCB Dec 3 08:03:03 np0005543227 certmonger[40943]: jYISb3ZlcmNsb3VkLm9vby50ZXN0oDMGCisGAQQBgjcUAgOgJQwjaGFwcm94eS9v Dec 3 08:03:03 np0005543227 certmonger[40943]: dmVyY2xvdWQub29vLnRlc3RAT09PLlRFU1SgQgYGKwYBBQICoDgwNqAKGwhPT08u Dec 3 08:03:03 np0005543227 certmonger[40943]: VEVTVKEoMCagAwIBAaEfMB0bB2hhcHJveHkbEm92ZXJjbG91ZC5vb28udGVzdDAd Dec 3 08:03:03 np0005543227 certmonger[40943]: BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNV Dec 3 08:03:03 np0005543227 certmonger[40943]: HQ4EFgQUpQjx0M8MsyRZuY2OzjF9hu1kmhowDQYJKoZIhvcNAQELBQADggEBANcR Dec 3 08:03:03 np0005543227 certmonger[40943]: C3KF9qGW885fBHtE7z54LLxUmoDBKiFQ0fsaw9/tpArwK3iPr5M34s+IhjogW4vO Dec 3 08:03:03 np0005543227 certmonger[40943]: M2+TU0bzj19/pk6uTQ48kLlwgqG4cqIivnPN/jW0z/FsNfcyiHifkcLerfVpYR2l Dec 3 08:03:03 np0005543227 certmonger[40943]: pz9tuz5X+jLdc3WTmcS1VZUTYAshbdMchW1j6/Ik8tDomnyuPLF30KXHar6jqZYd Dec 3 08:03:03 np0005543227 certmonger[40943]: Aelk1KMWYAtEFzqig03ijQC1Q4G5jiSIOmsxHpPBrlFm0OwFAkHMGXK9IQNu5aZy Dec 3 08:03:03 np0005543227 certmonger[40943]: m+K1YK9X5nMI5iKd8CnBXoul6Z06T3tSJ8PCb8ksamZJuTx4mB5qdsNf2kgLpeKq Dec 3 08:03:03 np0005543227 certmonger[40943]: 0wGy56aBzIgbxM4sJbo= Dec 3 08:03:03 np0005543227 certmonger[40943]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:03 np0005543227 certmonger[40943]: " for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6azsgU5e5gRxKisMoYKdP6VL0GxRKvX6TSsAZKSg01JsZNH5ycrse6J7oMMHRmsc31OmJlR7uYEnADWqEujqwe//cITWJ4NnTMal06gB+iakTSs7tpMV+cL232I9HSqYuDNffy57f0BEN1j5TD/U0eukFv1dSihK44wE1etIIBL3KaaT75nqaYO+ix58oePPPtnpOr04iikdU1D/Zgcnf95yaWHh+JAVvsJ6GiM8iX9BG+obOE0JuZdIfyCoqrEQeOa+1yAI34UNZeGSCQfs386Y6VxqaQIulIfJ3hJwnie2EoIXCMjSfrqc0PGojCt1ALTQgzq55QmNISrEoHEvaQIDAQAB" for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:03 np0005543227 certmonger[40943]: 2025-12-03 08:03:03 [40943] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[40943]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:03 np0005543227 certmonger[40943]: Certificate: "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" Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Certificate submission still ongoing. Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Certificate submission attempt complete. Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Child status = 0. Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Child output: Dec 3 08:03:03 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:03 np0005543227 certmonger[38965]: MIIFHzCCA4egAwIBAgIBKTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:03 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:03 np0005543227 certmonger[38965]: MDMwM1oXDTI3MTIwNDA4MDMwM1owMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Dec 3 08:03:03 np0005543227 certmonger[38965]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Dec 3 08:03:03 np0005543227 certmonger[38965]: AQoCggEBAOms7IFOXuYEcSorDKGCnT+lS9BsUSr1+k0rAGSkoNNSbGTR+cnK7Hui Dec 3 08:03:03 np0005543227 certmonger[38965]: e6DDB0ZrHN9TpiZUe7mBJwA1qhLo6sHv/3CE1ieDZ0zGpdOoAfompE0rO7aTFfnC Dec 3 08:03:03 np0005543227 certmonger[38965]: 9t9iPR0qmLgzX38ue39ARDdY+Uw/1NHrpBb9XUooSuOMBNXrSCAS9ymmk++Z6mmD Dec 3 08:03:03 np0005543227 certmonger[38965]: vosefKHjzz7Z6Tq9OIopHVNQ/2YHJ3/ecmlh4fiQFb7CehojPIl/QRvqGzhNCbmX Dec 3 08:03:03 np0005543227 certmonger[38965]: SH8gqKqxEHjmvtcgCN+FDWXhkgkH7N/OmOlcamkCLpSHyd4ScJ4nthKCFwjI0n66 Dec 3 08:03:03 np0005543227 certmonger[38965]: nNDxqIwrdQC00IM6ueUJjSEqxKBxL2kCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Dec 3 08:03:03 np0005543227 certmonger[38965]: FILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Dec 3 08:03:03 np0005543227 certmonger[38965]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Dec 3 08:03:03 np0005543227 certmonger[38965]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Dec 3 08:03:03 np0005543227 certmonger[38965]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Dec 3 08:03:03 np0005543227 certmonger[38965]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Dec 3 08:03:03 np0005543227 certmonger[38965]: b3JpdHkwHQYDVR0OBBYEFNIy7X9Sq/Tpm50fk8FET4BmcSuNMIGYBgNVHREEgZAw Dec 3 08:03:03 np0005543227 certmonger[38965]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Dec 3 08:03:03 np0005543227 certmonger[38965]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Dec 3 08:03:03 np0005543227 certmonger[38965]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Dec 3 08:03:03 np0005543227 certmonger[38965]: DQYJKoZIhvcNAQELBQADggGBAIwUYBOKZkCrZ48YYQLfSXjBLCicpv+8NqOqAHRO Dec 3 08:03:03 np0005543227 certmonger[38965]: kw32LdCaGo8F7e2JR59OU+ngPoce7Yj4MB8kgbNbYzoAXBFTWiuR+G97k849s2Nw Dec 3 08:03:03 np0005543227 certmonger[38965]: awlDNVJcR1pmHg8Vwc3+547prRV5VCvLFdQbAqpwg7M+W7hHs/ZeZQfnUvHgJux+ Dec 3 08:03:03 np0005543227 certmonger[38965]: BzvNG2yWaINuJHnknCzvl7hskfqThED/EsLn4yRVp4mGHBr3ZAGcdtheDcBTOrYw Dec 3 08:03:03 np0005543227 certmonger[38965]: lMX1SAyvzwJT2V1jMW2AHS1/oEIOfJOjeOoIdxbDtl2Tf6t6ceQnOc3sgvKr2mHF Dec 3 08:03:03 np0005543227 certmonger[38965]: 2TTc8WF9ol1g4UQ5qN4VXypw5adPuhzwfuD4xIVkkgfmF20ZSRYO5KGa2E0SzlbA Dec 3 08:03:03 np0005543227 certmonger[38965]: YiRPIpedEUysR6X22ZDMXrDhLS0T4aGXpaZoAU1wdl3tWBhodDK3tNxNGhehBTh+ Dec 3 08:03:03 np0005543227 certmonger[38965]: p0PTXYkWU7U7lEhyc4qppekFsXa6hMpRgzE/VlVsvSm1brkYJWc0gOdVqHd3DIiM Dec 3 08:03:03 np0005543227 certmonger[38965]: GPlqvDviSUSxx/J6cmqvsHWqrQ== Dec 3 08:03:03 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:03 np0005543227 certmonger[38965]: " Dec 3 08:03:03 np0005543227 certmonger[40945]: 2025-12-03 08:03:03 [40945] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:03 np0005543227 certmonger[40945]: MIIFHzCCA4egAwIBAgIBKTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:03 np0005543227 certmonger[40945]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:03 np0005543227 certmonger[40945]: MDMwM1oXDTI3MTIwNDA4MDMwM1owMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Dec 3 08:03:03 np0005543227 certmonger[40945]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Dec 3 08:03:03 np0005543227 certmonger[40945]: AQoCggEBAOms7IFOXuYEcSorDKGCnT+lS9BsUSr1+k0rAGSkoNNSbGTR+cnK7Hui Dec 3 08:03:03 np0005543227 certmonger[40945]: e6DDB0ZrHN9TpiZUe7mBJwA1qhLo6sHv/3CE1ieDZ0zGpdOoAfompE0rO7aTFfnC Dec 3 08:03:03 np0005543227 certmonger[40945]: 9t9iPR0qmLgzX38ue39ARDdY+Uw/1NHrpBb9XUooSuOMBNXrSCAS9ymmk++Z6mmD Dec 3 08:03:03 np0005543227 certmonger[40945]: vosefKHjzz7Z6Tq9OIopHVNQ/2YHJ3/ecmlh4fiQFb7CehojPIl/QRvqGzhNCbmX Dec 3 08:03:03 np0005543227 certmonger[40945]: SH8gqKqxEHjmvtcgCN+FDWXhkgkH7N/OmOlcamkCLpSHyd4ScJ4nthKCFwjI0n66 Dec 3 08:03:03 np0005543227 certmonger[40945]: nNDxqIwrdQC00IM6ueUJjSEqxKBxL2kCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Dec 3 08:03:03 np0005543227 certmonger[40945]: FILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Dec 3 08:03:03 np0005543227 certmonger[40945]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Dec 3 08:03:03 np0005543227 certmonger[40945]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Dec 3 08:03:03 np0005543227 certmonger[40945]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Dec 3 08:03:03 np0005543227 certmonger[40945]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Dec 3 08:03:03 np0005543227 certmonger[40945]: b3JpdHkwHQYDVR0OBBYEFNIy7X9Sq/Tpm50fk8FET4BmcSuNMIGYBgNVHREEgZAw Dec 3 08:03:03 np0005543227 certmonger[40945]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Dec 3 08:03:03 np0005543227 certmonger[40945]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Dec 3 08:03:03 np0005543227 certmonger[40945]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Dec 3 08:03:03 np0005543227 certmonger[40945]: DQYJKoZIhvcNAQELBQADggGBAIwUYBOKZkCrZ48YYQLfSXjBLCicpv+8NqOqAHRO Dec 3 08:03:03 np0005543227 certmonger[40945]: kw32LdCaGo8F7e2JR59OU+ngPoce7Yj4MB8kgbNbYzoAXBFTWiuR+G97k849s2Nw Dec 3 08:03:03 np0005543227 certmonger[40945]: awlDNVJcR1pmHg8Vwc3+547prRV5VCvLFdQbAqpwg7M+W7hHs/ZeZQfnUvHgJux+ Dec 3 08:03:03 np0005543227 certmonger[40945]: BzvNG2yWaINuJHnknCzvl7hskfqThED/EsLn4yRVp4mGHBr3ZAGcdtheDcBTOrYw Dec 3 08:03:03 np0005543227 certmonger[40945]: lMX1SAyvzwJT2V1jMW2AHS1/oEIOfJOjeOoIdxbDtl2Tf6t6ceQnOc3sgvKr2mHF Dec 3 08:03:03 np0005543227 certmonger[40945]: 2TTc8WF9ol1g4UQ5qN4VXypw5adPuhzwfuD4xIVkkgfmF20ZSRYO5KGa2E0SzlbA Dec 3 08:03:03 np0005543227 certmonger[40945]: YiRPIpedEUysR6X22ZDMXrDhLS0T4aGXpaZoAU1wdl3tWBhodDK3tNxNGhehBTh+ Dec 3 08:03:03 np0005543227 certmonger[40945]: p0PTXYkWU7U7lEhyc4qppekFsXa6hMpRgzE/VlVsvSm1brkYJWc0gOdVqHd3DIiM Dec 3 08:03:03 np0005543227 certmonger[40945]: GPlqvDviSUSxx/J6cmqvsHWqrQ== Dec 3 08:03:03 np0005543227 certmonger[40945]: -----END CERTIFICATE----- Dec 3 08:03:03 np0005543227 certmonger[40945]: ". Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Certificate submission still ongoing. Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Certificate submission postprocessing complete. Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Child status = 0. Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Child output: Dec 3 08:03:03 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nGPlqvDviSUSxx/J6cmqvsHWqrQ==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:03 np0005543227 certmonger[38965]: " Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:03 np0005543227 certmonger[38965]: MIIFHzCCA4egAwIBAgIBKTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:03 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:03 np0005543227 certmonger[38965]: MDMwM1oXDTI3MTIwNDA4MDMwM1owMDERMA8GA1UECgwIT09PLlRFU1QxGzAZBgNV Dec 3 08:03:03 np0005543227 certmonger[38965]: BAMMEm92ZXJjbG91ZC5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC Dec 3 08:03:03 np0005543227 certmonger[38965]: AQoCggEBAOms7IFOXuYEcSorDKGCnT+lS9BsUSr1+k0rAGSkoNNSbGTR+cnK7Hui Dec 3 08:03:03 np0005543227 certmonger[38965]: e6DDB0ZrHN9TpiZUe7mBJwA1qhLo6sHv/3CE1ieDZ0zGpdOoAfompE0rO7aTFfnC Dec 3 08:03:03 np0005543227 certmonger[38965]: 9t9iPR0qmLgzX38ue39ARDdY+Uw/1NHrpBb9XUooSuOMBNXrSCAS9ymmk++Z6mmD Dec 3 08:03:03 np0005543227 certmonger[38965]: vosefKHjzz7Z6Tq9OIopHVNQ/2YHJ3/ecmlh4fiQFb7CehojPIl/QRvqGzhNCbmX Dec 3 08:03:03 np0005543227 certmonger[38965]: SH8gqKqxEHjmvtcgCN+FDWXhkgkH7N/OmOlcamkCLpSHyd4ScJ4nthKCFwjI0n66 Dec 3 08:03:03 np0005543227 certmonger[38965]: nNDxqIwrdQC00IM6ueUJjSEqxKBxL2kCAwEAAaOCAb8wggG7MB8GA1UdIwQYMBaA Dec 3 08:03:03 np0005543227 certmonger[38965]: FILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcw Dec 3 08:03:03 np0005543227 certmonger[38965]: AYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE Dec 3 08:03:03 np0005543227 certmonger[38965]: 8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCg Dec 3 08:03:03 np0005543227 certmonger[38965]: LoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6i Dec 3 08:03:03 np0005543227 certmonger[38965]: NKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRo Dec 3 08:03:03 np0005543227 certmonger[38965]: b3JpdHkwHQYDVR0OBBYEFNIy7X9Sq/Tpm50fk8FET4BmcSuNMIGYBgNVHREEgZAw Dec 3 08:03:03 np0005543227 certmonger[38965]: gY2CEm92ZXJjbG91ZC5vb28udGVzdKAzBgorBgEEAYI3FAIDoCUMI2hhcHJveHkv Dec 3 08:03:03 np0005543227 certmonger[38965]: b3ZlcmNsb3VkLm9vby50ZXN0QE9PTy5URVNUoEIGBisGAQUCAqA4MDagChsIT09P Dec 3 08:03:03 np0005543227 certmonger[38965]: LlRFU1ShKDAmoAMCAQGhHzAdGwdoYXByb3h5GxJvdmVyY2xvdWQub29vLnRlc3Qw Dec 3 08:03:03 np0005543227 certmonger[38965]: DQYJKoZIhvcNAQELBQADggGBAIwUYBOKZkCrZ48YYQLfSXjBLCicpv+8NqOqAHRO Dec 3 08:03:03 np0005543227 certmonger[38965]: kw32LdCaGo8F7e2JR59OU+ngPoce7Yj4MB8kgbNbYzoAXBFTWiuR+G97k849s2Nw Dec 3 08:03:03 np0005543227 certmonger[38965]: awlDNVJcR1pmHg8Vwc3+547prRV5VCvLFdQbAqpwg7M+W7hHs/ZeZQfnUvHgJux+ Dec 3 08:03:03 np0005543227 certmonger[38965]: BzvNG2yWaINuJHnknCzvl7hskfqThED/EsLn4yRVp4mGHBr3ZAGcdtheDcBTOrYw Dec 3 08:03:03 np0005543227 certmonger[38965]: lMX1SAyvzwJT2V1jMW2AHS1/oEIOfJOjeOoIdxbDtl2Tf6t6ceQnOc3sgvKr2mHF Dec 3 08:03:03 np0005543227 certmonger[38965]: 2TTc8WF9ol1g4UQ5qN4VXypw5adPuhzwfuD4xIVkkgfmF20ZSRYO5KGa2E0SzlbA Dec 3 08:03:03 np0005543227 certmonger[38965]: YiRPIpedEUysR6X22ZDMXrDhLS0T4aGXpaZoAU1wdl3tWBhodDK3tNxNGhehBTh+ Dec 3 08:03:03 np0005543227 certmonger[38965]: p0PTXYkWU7U7lEhyc4qppekFsXa6hMpRgzE/VlVsvSm1brkYJWc0gOdVqHd3DIiM Dec 3 08:03:03 np0005543227 certmonger[38965]: GPlqvDviSUSxx/J6cmqvsHWqrQ== Dec 3 08:03:03 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:03 np0005543227 certmonger[38965]: ". Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] No hooks set for pre-save command. Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:03 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:03 np0005543227 certmonger[41017]: Certificate in file "/etc/pki/tls/certs/haproxy-external-cert.crt" issued by CA and saved. Dec 3 08:03:03 np0005543227 certmonger[38965]: 2025-12-03 08:03:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080302 Dec 3 08:03:04 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:04 np0005543227 python3[41033]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 08:03:04 np0005543227 python3[41049]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Dec 3 08:03:05 np0005543227 python3[41065]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:03:06 np0005543227 python3[41085]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:09 np0005543227 python3[41102]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:12 np0005543227 python3[41119]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:12 np0005543227 python3[41135]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:13 np0005543227 python3[41151]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:03:13 np0005543227 python3[41169]: ansible-certificate_request Invoked with name=haproxy-ctlplane-cert dns=['np0005543227.ctlplane.ooo.test', 'overcloud.ctlplane.ooo.test'] principal=['haproxy/np0005543227.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012cp "/etc/pki/tls/private/haproxy-ctlplane-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-ctlplane.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-ctlplane.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:13 np0005543227 certmonger[38965]: 2025-12-03 08:03:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:13 np0005543227 certmonger[38965]: 2025-12-03 08:03:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:13 np0005543227 certmonger[38965]: 2025-12-03 08:03:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:13 np0005543227 certmonger[38965]: 2025-12-03 08:03:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:13 np0005543227 certmonger[38965]: 2025-12-03 08:03:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:13 np0005543227 certmonger[38965]: 2025-12-03 08:03:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:13 np0005543227 certmonger[38965]: 2025-12-03 08:03:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:13 np0005543227 certmonger[38965]: 2025-12-03 08:03:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:13 np0005543227 certmonger[38965]: 2025-12-03 08:03:13 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.ctlplane.ooo.test" for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.ctlplane.ooo.test Dec 3 08:03:14 np0005543227 certmonger[41179]: overcloud.ctlplane.ooo.test Dec 3 08:03:14 np0005543227 certmonger[41179]: " for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005543227.ctlplane.ooo.test@OOO.TEST Dec 3 08:03:14 np0005543227 certmonger[41179]: " for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:14 np0005543227 certmonger[41179]: MIID6TCCAtECAQAwKTEnMCUGA1UEAxMebnAwMDA1NTQzMjI3LmN0bHBsYW5lLm9v Dec 3 08:03:14 np0005543227 certmonger[41179]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmm2V/cJ//9M0 Dec 3 08:03:14 np0005543227 certmonger[41179]: SR1WZPFp51B71ps6fYdqMfWpmvCuSCFJfc3BFJXKUffnOpeH8p76wsEUkDazpCO2 Dec 3 08:03:14 np0005543227 certmonger[41179]: Jq5Lv7rjQnSfFPrT+Tu9zQsV9vu3P+V8KnDafR/6MLrNrG50iLDTBRceURzVtLx6 Dec 3 08:03:14 np0005543227 certmonger[41179]: Otx5Dd3L/bqHV+qIim6PEvBXcPKi1hmlbzCgYs69Ru+venYBQth3086ZTfdHVZjz Dec 3 08:03:14 np0005543227 certmonger[41179]: bUm7r7XmACEzeGEtF87K3mXGrq9tZRpxQdg4XIBJc/R4o3lmCMsqXlnaNzu4oOrK Dec 3 08:03:14 np0005543227 certmonger[41179]: PWcHUnf0h7MjDcTaTDijyQDLd+v3U3ONHwzJvnvEV5lkYeJzZwz76Yt9+t5xdIJG Dec 3 08:03:14 np0005543227 certmonger[41179]: twbyGePthwIDAQABoIIBeTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAyADAA Dec 3 08:03:14 np0005543227 certmonger[41179]: MwAwADgAMAAzADEAMzCCAUgGCSqGSIb3DQEJDjGCATkwggE1MAsGA1UdDwQEAwIF Dec 3 08:03:14 np0005543227 certmonger[41179]: oDCB2QYDVR0RBIHRMIHOgh5ucDAwMDU1NDMyMjcuY3RscGxhbmUub29vLnRlc3SC Dec 3 08:03:14 np0005543227 certmonger[41179]: G292ZXJjbG91ZC5jdGxwbGFuZS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML2hh Dec 3 08:03:14 np0005543227 certmonger[41179]: cHJveHkvbnAwMDA1NTQzMjI3LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoE4G Dec 3 08:03:14 np0005543227 certmonger[41179]: BisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwdoYXByb3h5Gx5u Dec 3 08:03:14 np0005543227 certmonger[41179]: cDAwMDU1NDMyMjcuY3RscGxhbmUub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUH Dec 3 08:03:14 np0005543227 certmonger[41179]: AwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFKUI8dDPDLMkWbmN Dec 3 08:03:14 np0005543227 certmonger[41179]: js4xfYbtZJoaMA0GCSqGSIb3DQEBCwUAA4IBAQAkxqrOsRaIf5OXhY75oBW6M2cz Dec 3 08:03:14 np0005543227 certmonger[41179]: zIfJmCJRFv5P8t5QTUuHVbk07kzkDUn1VlV64t5tkDUICNEnseRRcAbXAnQrExO7 Dec 3 08:03:14 np0005543227 certmonger[41179]: OkXtCz94cacSvmlQEuYgG1R8ISL9oFvf3g7lvHIUh4un4Gzpch/d30/ovVPngTcT Dec 3 08:03:14 np0005543227 certmonger[41179]: y0vAuXbHp1ETWMHgyMfJrnpjPzhI1NaLU9KVR2uDl1nl7Eu6PhVDXg1f9l+k8ABe Dec 3 08:03:14 np0005543227 certmonger[41179]: NPeu5kIE+awQm7Zt7gr939k03T3NzqkhY+37mnvZ1SqpjWTCQhMoZzYacAKxPrAS Dec 3 08:03:14 np0005543227 certmonger[41179]: 50WQRX5t5K1/mvIiOToBnBlxKWkq5CDAxG8IGZJKepstILfJDEsr/6dqx9qv Dec 3 08:03:14 np0005543227 certmonger[41179]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:14 np0005543227 certmonger[41179]: " for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmm2V/cJ//9M0SR1WZPFp51B71ps6fYdqMfWpmvCuSCFJfc3BFJXKUffnOpeH8p76wsEUkDazpCO2Jq5Lv7rjQnSfFPrT+Tu9zQsV9vu3P+V8KnDafR/6MLrNrG50iLDTBRceURzVtLx6Otx5Dd3L/bqHV+qIim6PEvBXcPKi1hmlbzCgYs69Ru+venYBQth3086ZTfdHVZjzbUm7r7XmACEzeGEtF87K3mXGrq9tZRpxQdg4XIBJc/R4o3lmCMsqXlnaNzu4oOrKPWcHUnf0h7MjDcTaTDijyQDLd+v3U3ONHwzJvnvEV5lkYeJzZwz76Yt9+t5xdIJGtwbyGePthwIDAQAB" for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:14 np0005543227 certmonger[41179]: 2025-12-03 08:03:14 [41179] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[41179]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:14 np0005543227 certmonger[41179]: Certificate: "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" Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Certificate submission still ongoing. Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Certificate submission attempt complete. Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Child status = 0. Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Child output: Dec 3 08:03:14 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:14 np0005543227 certmonger[38965]: MIIFbDCCA9SgAwIBAgIBKjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:14 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:14 np0005543227 certmonger[38965]: MDMxNFoXDTI3MTIwNDA4MDMxNFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 08:03:14 np0005543227 certmonger[38965]: BAMMHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 08:03:14 np0005543227 certmonger[38965]: AQEBBQADggEPADCCAQoCggEBAJptlf3Cf//TNEkdVmTxaedQe9abOn2HajH1qZrw Dec 3 08:03:14 np0005543227 certmonger[38965]: rkghSX3NwRSVylH35zqXh/Ke+sLBFJA2s6QjtiauS7+640J0nxT60/k7vc0LFfb7 Dec 3 08:03:14 np0005543227 certmonger[38965]: tz/lfCpw2n0f+jC6zaxudIiw0wUXHlEc1bS8ejrceQ3dy/26h1fqiIpujxLwV3Dy Dec 3 08:03:14 np0005543227 certmonger[38965]: otYZpW8woGLOvUbvr3p2AULYd9POmU33R1WY821Ju6+15gAhM3hhLRfOyt5lxq6v Dec 3 08:03:14 np0005543227 certmonger[38965]: bWUacUHYOFyASXP0eKN5ZgjLKl5Z2jc7uKDqyj1nB1J39IezIw3E2kw4o8kAy3fr Dec 3 08:03:14 np0005543227 certmonger[38965]: 91NzjR8Myb57xFeZZGHic2cM++mLffrecXSCRrcG8hnj7YcCAwEAAaOCAgAwggH8 Dec 3 08:03:14 np0005543227 certmonger[38965]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 08:03:14 np0005543227 certmonger[38965]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 08:03:14 np0005543227 certmonger[38965]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 08:03:14 np0005543227 certmonger[38965]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 08:03:14 np0005543227 certmonger[38965]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 08:03:14 np0005543227 certmonger[38965]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDxVgTOghZk9tcC+P1d9JE+hglo+ Dec 3 08:03:14 np0005543227 certmonger[38965]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdIIb Dec 3 08:03:14 np0005543227 certmonger[38965]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Dec 3 08:03:14 np0005543227 certmonger[38965]: cm94eS9ucDAwMDU1NDMyMjcuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Dec 3 08:03:14 np0005543227 certmonger[38965]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Dec 3 08:03:14 np0005543227 certmonger[38965]: MDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Dec 3 08:03:14 np0005543227 certmonger[38965]: e6aBRWLOdSeaOWW9FurCqsd6/Eb+LMC/1Hz4/vO1xC13y7VKJN2awY33rt5XB6rO Dec 3 08:03:14 np0005543227 certmonger[38965]: ijhQkPK0W1iYC/cY7pteeqj1cH24V5U4+jObvcTeDwm+q1xcMMYqbzhWFjboSp3K Dec 3 08:03:14 np0005543227 certmonger[38965]: EoMvxGbQJVR7HrO61RJd91FJ9uNbOElvym8y454mA/anyz3z2RiXDT5CjpY3JInp Dec 3 08:03:14 np0005543227 certmonger[38965]: uxWIMJSE7reb81Cnsoan6BplA+GRUP7Rh8p9MrrbPKgTAE9EDsGNCcu0YUyEUFVx Dec 3 08:03:14 np0005543227 certmonger[38965]: 1u1F4hYSXyb3JvTuQcdoSiHM8XaWGpYW634utPW6472x/KPanVNSwCttzYNkiw6/ Dec 3 08:03:14 np0005543227 certmonger[38965]: rKLXu3vfaStBNDo6I+DD994vh+xEKRVwjV3FSPYetEij+0dcMiH0gSJDCcFC6sc+ Dec 3 08:03:14 np0005543227 certmonger[38965]: YzqRIJYE0oRsdMH2so5M/yOkjJdAaxBd2xpE+EgZaLJ33RXuCxxCjSfgm+ldRf63 Dec 3 08:03:14 np0005543227 certmonger[38965]: MMXBMMOr+zQrBJ0QSUK18ztWOJgMi6IsH8jBYXzs3rYRugXexAWmGT0qBCNRuo74 Dec 3 08:03:14 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:14 np0005543227 certmonger[38965]: " Dec 3 08:03:14 np0005543227 certmonger[41181]: 2025-12-03 08:03:14 [41181] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:14 np0005543227 certmonger[41181]: MIIFbDCCA9SgAwIBAgIBKjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:14 np0005543227 certmonger[41181]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:14 np0005543227 certmonger[41181]: MDMxNFoXDTI3MTIwNDA4MDMxNFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 08:03:14 np0005543227 certmonger[41181]: BAMMHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 08:03:14 np0005543227 certmonger[41181]: AQEBBQADggEPADCCAQoCggEBAJptlf3Cf//TNEkdVmTxaedQe9abOn2HajH1qZrw Dec 3 08:03:14 np0005543227 certmonger[41181]: rkghSX3NwRSVylH35zqXh/Ke+sLBFJA2s6QjtiauS7+640J0nxT60/k7vc0LFfb7 Dec 3 08:03:14 np0005543227 certmonger[41181]: tz/lfCpw2n0f+jC6zaxudIiw0wUXHlEc1bS8ejrceQ3dy/26h1fqiIpujxLwV3Dy Dec 3 08:03:14 np0005543227 certmonger[41181]: otYZpW8woGLOvUbvr3p2AULYd9POmU33R1WY821Ju6+15gAhM3hhLRfOyt5lxq6v Dec 3 08:03:14 np0005543227 certmonger[41181]: bWUacUHYOFyASXP0eKN5ZgjLKl5Z2jc7uKDqyj1nB1J39IezIw3E2kw4o8kAy3fr Dec 3 08:03:14 np0005543227 certmonger[41181]: 91NzjR8Myb57xFeZZGHic2cM++mLffrecXSCRrcG8hnj7YcCAwEAAaOCAgAwggH8 Dec 3 08:03:14 np0005543227 certmonger[41181]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 08:03:14 np0005543227 certmonger[41181]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 08:03:14 np0005543227 certmonger[41181]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 08:03:14 np0005543227 certmonger[41181]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 08:03:14 np0005543227 certmonger[41181]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 08:03:14 np0005543227 certmonger[41181]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDxVgTOghZk9tcC+P1d9JE+hglo+ Dec 3 08:03:14 np0005543227 certmonger[41181]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdIIb Dec 3 08:03:14 np0005543227 certmonger[41181]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Dec 3 08:03:14 np0005543227 certmonger[41181]: cm94eS9ucDAwMDU1NDMyMjcuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Dec 3 08:03:14 np0005543227 certmonger[41181]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Dec 3 08:03:14 np0005543227 certmonger[41181]: MDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Dec 3 08:03:14 np0005543227 certmonger[41181]: e6aBRWLOdSeaOWW9FurCqsd6/Eb+LMC/1Hz4/vO1xC13y7VKJN2awY33rt5XB6rO Dec 3 08:03:14 np0005543227 certmonger[41181]: ijhQkPK0W1iYC/cY7pteeqj1cH24V5U4+jObvcTeDwm+q1xcMMYqbzhWFjboSp3K Dec 3 08:03:14 np0005543227 certmonger[41181]: EoMvxGbQJVR7HrO61RJd91FJ9uNbOElvym8y454mA/anyz3z2RiXDT5CjpY3JInp Dec 3 08:03:14 np0005543227 certmonger[41181]: uxWIMJSE7reb81Cnsoan6BplA+GRUP7Rh8p9MrrbPKgTAE9EDsGNCcu0YUyEUFVx Dec 3 08:03:14 np0005543227 certmonger[41181]: 1u1F4hYSXyb3JvTuQcdoSiHM8XaWGpYW634utPW6472x/KPanVNSwCttzYNkiw6/ Dec 3 08:03:14 np0005543227 certmonger[41181]: rKLXu3vfaStBNDo6I+DD994vh+xEKRVwjV3FSPYetEij+0dcMiH0gSJDCcFC6sc+ Dec 3 08:03:14 np0005543227 certmonger[41181]: YzqRIJYE0oRsdMH2so5M/yOkjJdAaxBd2xpE+EgZaLJ33RXuCxxCjSfgm+ldRf63 Dec 3 08:03:14 np0005543227 certmonger[41181]: MMXBMMOr+zQrBJ0QSUK18ztWOJgMi6IsH8jBYXzs3rYRugXexAWmGT0qBCNRuo74 Dec 3 08:03:14 np0005543227 certmonger[41181]: -----END CERTIFICATE----- Dec 3 08:03:14 np0005543227 certmonger[41181]: ". Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Certificate submission still ongoing. Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Certificate submission postprocessing complete. Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Child status = 0. Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Child output: Dec 3 08:03:14 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:14 np0005543227 certmonger[38965]: " Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:14 np0005543227 certmonger[38965]: MIIFbDCCA9SgAwIBAgIBKjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:14 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:14 np0005543227 certmonger[38965]: MDMxNFoXDTI3MTIwNDA4MDMxNFowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Dec 3 08:03:14 np0005543227 certmonger[38965]: BAMMHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Dec 3 08:03:14 np0005543227 certmonger[38965]: AQEBBQADggEPADCCAQoCggEBAJptlf3Cf//TNEkdVmTxaedQe9abOn2HajH1qZrw Dec 3 08:03:14 np0005543227 certmonger[38965]: rkghSX3NwRSVylH35zqXh/Ke+sLBFJA2s6QjtiauS7+640J0nxT60/k7vc0LFfb7 Dec 3 08:03:14 np0005543227 certmonger[38965]: tz/lfCpw2n0f+jC6zaxudIiw0wUXHlEc1bS8ejrceQ3dy/26h1fqiIpujxLwV3Dy Dec 3 08:03:14 np0005543227 certmonger[38965]: otYZpW8woGLOvUbvr3p2AULYd9POmU33R1WY821Ju6+15gAhM3hhLRfOyt5lxq6v Dec 3 08:03:14 np0005543227 certmonger[38965]: bWUacUHYOFyASXP0eKN5ZgjLKl5Z2jc7uKDqyj1nB1J39IezIw3E2kw4o8kAy3fr Dec 3 08:03:14 np0005543227 certmonger[38965]: 91NzjR8Myb57xFeZZGHic2cM++mLffrecXSCRrcG8hnj7YcCAwEAAaOCAgAwggH8 Dec 3 08:03:14 np0005543227 certmonger[38965]: MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4w Dec 3 08:03:14 np0005543227 certmonger[38965]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Dec 3 08:03:14 np0005543227 certmonger[38965]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Dec 3 08:03:14 np0005543227 certmonger[38965]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Dec 3 08:03:14 np0005543227 certmonger[38965]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Dec 3 08:03:14 np0005543227 certmonger[38965]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFDxVgTOghZk9tcC+P1d9JE+hglo+ Dec 3 08:03:14 np0005543227 certmonger[38965]: MIHZBgNVHREEgdEwgc6CHm5wMDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdIIb Dec 3 08:03:14 np0005543227 certmonger[38965]: b3ZlcmNsb3VkLmN0bHBsYW5lLm9vby50ZXN0oD8GCisGAQQBgjcUAgOgMQwvaGFw Dec 3 08:03:14 np0005543227 certmonger[38965]: cm94eS9ucDAwMDU1NDMyMjcuY3RscGxhbmUub29vLnRlc3RAT09PLlRFU1SgTgYG Dec 3 08:03:14 np0005543227 certmonger[38965]: KwYBBQICoEQwQqAKGwhPT08uVEVTVKE0MDKgAwIBAaErMCkbB2hhcHJveHkbHm5w Dec 3 08:03:14 np0005543227 certmonger[38965]: MDAwNTU0MzIyNy5jdGxwbGFuZS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEA Dec 3 08:03:14 np0005543227 certmonger[38965]: e6aBRWLOdSeaOWW9FurCqsd6/Eb+LMC/1Hz4/vO1xC13y7VKJN2awY33rt5XB6rO Dec 3 08:03:14 np0005543227 certmonger[38965]: ijhQkPK0W1iYC/cY7pteeqj1cH24V5U4+jObvcTeDwm+q1xcMMYqbzhWFjboSp3K Dec 3 08:03:14 np0005543227 certmonger[38965]: EoMvxGbQJVR7HrO61RJd91FJ9uNbOElvym8y454mA/anyz3z2RiXDT5CjpY3JInp Dec 3 08:03:14 np0005543227 certmonger[38965]: uxWIMJSE7reb81Cnsoan6BplA+GRUP7Rh8p9MrrbPKgTAE9EDsGNCcu0YUyEUFVx Dec 3 08:03:14 np0005543227 certmonger[38965]: 1u1F4hYSXyb3JvTuQcdoSiHM8XaWGpYW634utPW6472x/KPanVNSwCttzYNkiw6/ Dec 3 08:03:14 np0005543227 certmonger[38965]: rKLXu3vfaStBNDo6I+DD994vh+xEKRVwjV3FSPYetEij+0dcMiH0gSJDCcFC6sc+ Dec 3 08:03:14 np0005543227 certmonger[38965]: YzqRIJYE0oRsdMH2so5M/yOkjJdAaxBd2xpE+EgZaLJ33RXuCxxCjSfgm+ldRf63 Dec 3 08:03:14 np0005543227 certmonger[38965]: MMXBMMOr+zQrBJ0QSUK18ztWOJgMi6IsH8jBYXzs3rYRugXexAWmGT0qBCNRuo74 Dec 3 08:03:14 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:14 np0005543227 certmonger[38965]: ". Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] No hooks set for pre-save command. Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:14 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:14 np0005543227 certmonger[41254]: Certificate in file "/etc/pki/tls/certs/haproxy-ctlplane-cert.crt" issued by CA and saved. Dec 3 08:03:14 np0005543227 certmonger[38965]: 2025-12-03 08:03:14 [38965] Wrote to /var/lib/certmonger/requests/20251203080313 Dec 3 08:03:15 np0005543227 python3[41270]: ansible-certificate_request Invoked with name=haproxy-storage-cert dns=['np0005543227.storage.ooo.test', 'overcloud.storage.ooo.test'] principal=['haproxy/np0005543227.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012cp "/etc/pki/tls/private/haproxy-storage-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:15 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:15 np0005543227 certmonger[38965]: 2025-12-03 08:03:15 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543227 certmonger[38965]: 2025-12-03 08:03:15 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543227 certmonger[38965]: 2025-12-03 08:03:15 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543227 certmonger[38965]: 2025-12-03 08:03:15 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543227 certmonger[38965]: 2025-12-03 08:03:15 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543227 certmonger[38965]: 2025-12-03 08:03:15 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543227 certmonger[38965]: 2025-12-03 08:03:15 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543227 certmonger[38965]: 2025-12-03 08:03:15 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:15 np0005543227 certmonger[38965]: 2025-12-03 08:03:15 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.storage.ooo.test" for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.storage.ooo.test Dec 3 08:03:16 np0005543227 certmonger[41280]: overcloud.storage.ooo.test Dec 3 08:03:16 np0005543227 certmonger[41280]: " for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005543227.storage.ooo.test@OOO.TEST Dec 3 08:03:16 np0005543227 certmonger[41280]: " for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:16 np0005543227 certmonger[41280]: MIID5DCCAswCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29v Dec 3 08:03:16 np0005543227 certmonger[41280]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDAiKFJ11QNbBAH Dec 3 08:03:16 np0005543227 certmonger[41280]: Z/z+evOnK/Y4ok0I1KAMc4IGGPkS+54Yo9qMLQXvmXfTSTA2IpPh8pkqctT9ZMzQ Dec 3 08:03:16 np0005543227 certmonger[41280]: W4w/FIFnqIsd3oS7JmsgqpgmET1kHFVxSB0xOtasHuiI0Q4fQxq80pg9mhV0Gjfd Dec 3 08:03:16 np0005543227 certmonger[41280]: uL5KS9wy2RBjUD7fyx4mcSHfCGqPSGM41u0o3IPEoDT9o1f+zvXZlVn0e1Qy2nnM Dec 3 08:03:16 np0005543227 certmonger[41280]: Tijp5GgzPSBhRyeOGAiqh6nEj5EFF2xuElKKYxZtSa5+IT8Mxql0zDPj6fHsWzjk Dec 3 08:03:16 np0005543227 certmonger[41280]: Oii/O/WOdY1+AGfwA1cR4Y6sOxEc175PFX4f/RFP/w51S/AWc88CStZspbnLiWsK Dec 3 08:03:16 np0005543227 certmonger[41280]: 8c74O9yTAgMBAAGgggF1MCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADIAMAAz Dec 3 08:03:16 np0005543227 certmonger[41280]: ADAAOAAwADMAMQA1MIIBRAYJKoZIhvcNAQkOMYIBNTCCATEwCwYDVR0PBAQDAgWg Dec 3 08:03:16 np0005543227 certmonger[41280]: MIHVBgNVHREEgc0wgcqCHW5wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0ghpv Dec 3 08:03:16 np0005543227 certmonger[41280]: dmVyY2xvdWQuc3RvcmFnZS5vb28udGVzdKA+BgorBgEEAYI3FAIDoDAMLmhhcHJv Dec 3 08:03:16 np0005543227 certmonger[41280]: eHkvbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3RAT09PLlRFU1SgTQYGKwYB Dec 3 08:03:16 np0005543227 certmonger[41280]: BQICoEMwQaAKGwhPT08uVEVTVKEzMDGgAwIBAaEqMCgbB2hhcHJveHkbHW5wMDAw Dec 3 08:03:16 np0005543227 certmonger[41280]: NTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr Dec 3 08:03:16 np0005543227 certmonger[41280]: BgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBT7ptLSF1pdkKoaOmfqcT7+ Dec 3 08:03:16 np0005543227 certmonger[41280]: 67x00jANBgkqhkiG9w0BAQsFAAOCAQEAZ6AoLNNEZ9i15TTqh+0QL93migDLGwKh Dec 3 08:03:16 np0005543227 certmonger[41280]: yQLwRx1UMh2sE9jChtce9jV0fviMmZuzqCNkkd1vkp5I28EQ24zWsfySSRoWaeQB Dec 3 08:03:16 np0005543227 certmonger[41280]: nfhLrS5MSHBE6tur1GrGCpU4YW8usNUFiJZyz4VKs7xEZe5addsdA1efAojeyuB8 Dec 3 08:03:16 np0005543227 certmonger[41280]: OiLI0yfyCPbrELlw3cxhH38ZG7IozGjKdP7Zxai2uqe0qGPxfLq5KWkj5ZS8E2C8 Dec 3 08:03:16 np0005543227 certmonger[41280]: e3bJux8ExLCbOl4owWIkQUYme1bpqGdyZfkph+GupG+2aEHSeRRqRlMNiz9zBj8D Dec 3 08:03:16 np0005543227 certmonger[41280]: ZfA20uM/tX/KfqhAhRxw/npUFK+QI5LiDApPNtVRZsvZ/VEzz3JvOw== Dec 3 08:03:16 np0005543227 certmonger[41280]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:16 np0005543227 certmonger[41280]: " for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDAiKFJ11QNbBAHZ/z+evOnK/Y4ok0I1KAMc4IGGPkS+54Yo9qMLQXvmXfTSTA2IpPh8pkqctT9ZMzQW4w/FIFnqIsd3oS7JmsgqpgmET1kHFVxSB0xOtasHuiI0Q4fQxq80pg9mhV0GjfduL5KS9wy2RBjUD7fyx4mcSHfCGqPSGM41u0o3IPEoDT9o1f+zvXZlVn0e1Qy2nnMTijp5GgzPSBhRyeOGAiqh6nEj5EFF2xuElKKYxZtSa5+IT8Mxql0zDPj6fHsWzjkOii/O/WOdY1+AGfwA1cR4Y6sOxEc175PFX4f/RFP/w51S/AWc88CStZspbnLiWsK8c74O9yTAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAii+PD+rFYZ2/2vh4i0GxLHkuFyv7bqBxhG9lN+fe/INk6w9HG3MF5SXb7q2iOMZBXkGhuojYTOffW+tUEaX+aiPqUUopB588py/21N19z2+27S3711RHKbyQiPUP9pQiprY7bXgSHjBSM/w14SB6Zslaqr9iWd6foi1/VxrN7r/PdzuBTQpeCfXWOJwSmEz6VcgwLgwxwuWK6CbO42Z/w3NwdwuqN5savzycKBzcxrO4qAGjzeZqxJL4loZrLitDw7SD5gJUJkScVWempT1Jo/tYc+xRdIaZyG/QDK7f/mpGdNN5DT6LwrpLCJtnjmRZjYEQENxWjqcEfPxjdU4Eeg==" for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwIihSddUDWwQB2f8/nrzpyv2OKJNCNSgDHOCBhj5EvueGKPajC0F75l300kwNiKT4fKZKnLU/WTM0FuMPxSBZ6iLHd6EuyZrIKqYJhE9ZBxVcUgdMTrWrB7oiNEOH0MavNKYPZoVdBo33bi+SkvcMtkQY1A+38seJnEh3whqj0hjONbtKNyDxKA0/aNX/s712ZVZ9HtUMtp5zE4o6eRoMz0gYUcnjhgIqoepxI+RBRdsbhJSimMWbUmufiE/DMapdMwz4+nx7Fs45Doovzv1jnWNfgBn8ANXEeGOrDsRHNe+TxV+H/0RT/8OdUvwFnPPAkrWbKW5y4lrCvHO+DvckwIDAQAB" for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:16 np0005543227 certmonger[41280]: 2025-12-03 08:03:16 [41280] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[41280]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:16 np0005543227 certmonger[41280]: Certificate: "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" Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Certificate submission still ongoing. Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Certificate submission attempt complete. Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Child status = 0. Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Child output: Dec 3 08:03:16 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:16 np0005543227 certmonger[38965]: MIIFZzCCA8+gAwIBAgIBLDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:16 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:16 np0005543227 certmonger[38965]: MDMxNloXDTI3MTIwNDA4MDMxNlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 08:03:16 np0005543227 certmonger[38965]: BAMMHW5wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 08:03:16 np0005543227 certmonger[38965]: AQEFAAOCAQ8AMIIBCgKCAQEAwIihSddUDWwQB2f8/nrzpyv2OKJNCNSgDHOCBhj5 Dec 3 08:03:16 np0005543227 certmonger[38965]: EvueGKPajC0F75l300kwNiKT4fKZKnLU/WTM0FuMPxSBZ6iLHd6EuyZrIKqYJhE9 Dec 3 08:03:16 np0005543227 certmonger[38965]: ZBxVcUgdMTrWrB7oiNEOH0MavNKYPZoVdBo33bi+SkvcMtkQY1A+38seJnEh3whq Dec 3 08:03:16 np0005543227 certmonger[38965]: j0hjONbtKNyDxKA0/aNX/s712ZVZ9HtUMtp5zE4o6eRoMz0gYUcnjhgIqoepxI+R Dec 3 08:03:16 np0005543227 certmonger[38965]: BRdsbhJSimMWbUmufiE/DMapdMwz4+nx7Fs45Doovzv1jnWNfgBn8ANXEeGOrDsR Dec 3 08:03:16 np0005543227 certmonger[38965]: HNe+TxV+H/0RT/8OdUvwFnPPAkrWbKW5y4lrCvHO+DvckwIDAQABo4IB/DCCAfgw Dec 3 08:03:16 np0005543227 certmonger[38965]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 08:03:16 np0005543227 certmonger[38965]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 08:03:16 np0005543227 certmonger[38965]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 08:03:16 np0005543227 certmonger[38965]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 08:03:16 np0005543227 certmonger[38965]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 08:03:16 np0005543227 certmonger[38965]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUe9dZpgGP1k00pAfrZJ8o6HsZOEkw Dec 3 08:03:16 np0005543227 certmonger[38965]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3SCGm92 Dec 3 08:03:16 np0005543227 certmonger[38965]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Dec 3 08:03:16 np0005543227 certmonger[38965]: eS9ucDAwMDU1NDMyMjcuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Dec 3 08:03:16 np0005543227 certmonger[38965]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Dec 3 08:03:16 np0005543227 certmonger[38965]: NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAIWQeU1Y Dec 3 08:03:16 np0005543227 certmonger[38965]: zIzlPOnpACu8dMFsLPhSRcKgd+NmYZt2/gcgcaJ5Kvytf+ucuHSLdDcW1BYxqOk0 Dec 3 08:03:16 np0005543227 certmonger[38965]: nW6+RRZeaMEKli2ZYkXvsBM/wjYpCuf58rvyMBWiLi5fxyI+7pO7OSFztW3bxBeY Dec 3 08:03:16 np0005543227 certmonger[38965]: TtbMyBh76925FvEfW+0Z+JNVUxlQQ2EZDE0c3z7Nq4Ji/jizY8zmjCWG6Gj7E9n3 Dec 3 08:03:16 np0005543227 certmonger[38965]: zbewMU76Wb6lMkstS1sX5T2Sak1xbrOXqKIOIfhWl1HG0qOITLgKFKjUc2G7Syyn Dec 3 08:03:16 np0005543227 certmonger[38965]: MiSkXXQXMdLzq5+zeLN/ZXMSdKbMXYPxu8ISWqBGZjCfqVIyej0l1n5M4yvaUvYx Dec 3 08:03:16 np0005543227 certmonger[38965]: Mowlfj70GfcFeuiDl2UBPQ8SIPUahqzBozTT5Yoyf9wwzNhjtMUhxowbaQ3HYXcq Dec 3 08:03:16 np0005543227 certmonger[38965]: hf1K3T0AN/eIjj3qrTs48Fh21umqA1YSOFuk43s/qaHkjbvhu1yviWkY3Tp5wVSy Dec 3 08:03:16 np0005543227 certmonger[38965]: xM6XJWFzEj1nifH+jgSNAo7lTVTT8jfkCFyq7zpidZGACkz1r0QM72zLsA== Dec 3 08:03:16 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:16 np0005543227 certmonger[38965]: " Dec 3 08:03:16 np0005543227 certmonger[41282]: 2025-12-03 08:03:16 [41282] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:16 np0005543227 certmonger[41282]: MIIFZzCCA8+gAwIBAgIBLDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:16 np0005543227 certmonger[41282]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:16 np0005543227 certmonger[41282]: MDMxNloXDTI3MTIwNDA4MDMxNlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 08:03:16 np0005543227 certmonger[41282]: BAMMHW5wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 08:03:16 np0005543227 certmonger[41282]: AQEFAAOCAQ8AMIIBCgKCAQEAwIihSddUDWwQB2f8/nrzpyv2OKJNCNSgDHOCBhj5 Dec 3 08:03:16 np0005543227 certmonger[41282]: EvueGKPajC0F75l300kwNiKT4fKZKnLU/WTM0FuMPxSBZ6iLHd6EuyZrIKqYJhE9 Dec 3 08:03:16 np0005543227 certmonger[41282]: ZBxVcUgdMTrWrB7oiNEOH0MavNKYPZoVdBo33bi+SkvcMtkQY1A+38seJnEh3whq Dec 3 08:03:16 np0005543227 certmonger[41282]: j0hjONbtKNyDxKA0/aNX/s712ZVZ9HtUMtp5zE4o6eRoMz0gYUcnjhgIqoepxI+R Dec 3 08:03:16 np0005543227 certmonger[41282]: BRdsbhJSimMWbUmufiE/DMapdMwz4+nx7Fs45Doovzv1jnWNfgBn8ANXEeGOrDsR Dec 3 08:03:16 np0005543227 certmonger[41282]: HNe+TxV+H/0RT/8OdUvwFnPPAkrWbKW5y4lrCvHO+DvckwIDAQABo4IB/DCCAfgw Dec 3 08:03:16 np0005543227 certmonger[41282]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 08:03:16 np0005543227 certmonger[41282]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 08:03:16 np0005543227 certmonger[41282]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 08:03:16 np0005543227 certmonger[41282]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 08:03:16 np0005543227 certmonger[41282]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 08:03:16 np0005543227 certmonger[41282]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUe9dZpgGP1k00pAfrZJ8o6HsZOEkw Dec 3 08:03:16 np0005543227 certmonger[41282]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3SCGm92 Dec 3 08:03:16 np0005543227 certmonger[41282]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Dec 3 08:03:16 np0005543227 certmonger[41282]: eS9ucDAwMDU1NDMyMjcuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Dec 3 08:03:16 np0005543227 certmonger[41282]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Dec 3 08:03:16 np0005543227 certmonger[41282]: NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAIWQeU1Y Dec 3 08:03:16 np0005543227 certmonger[41282]: zIzlPOnpACu8dMFsLPhSRcKgd+NmYZt2/gcgcaJ5Kvytf+ucuHSLdDcW1BYxqOk0 Dec 3 08:03:16 np0005543227 certmonger[41282]: nW6+RRZeaMEKli2ZYkXvsBM/wjYpCuf58rvyMBWiLi5fxyI+7pO7OSFztW3bxBeY Dec 3 08:03:16 np0005543227 certmonger[41282]: TtbMyBh76925FvEfW+0Z+JNVUxlQQ2EZDE0c3z7Nq4Ji/jizY8zmjCWG6Gj7E9n3 Dec 3 08:03:16 np0005543227 certmonger[41282]: zbewMU76Wb6lMkstS1sX5T2Sak1xbrOXqKIOIfhWl1HG0qOITLgKFKjUc2G7Syyn Dec 3 08:03:16 np0005543227 certmonger[41282]: MiSkXXQXMdLzq5+zeLN/ZXMSdKbMXYPxu8ISWqBGZjCfqVIyej0l1n5M4yvaUvYx Dec 3 08:03:16 np0005543227 certmonger[41282]: Mowlfj70GfcFeuiDl2UBPQ8SIPUahqzBozTT5Yoyf9wwzNhjtMUhxowbaQ3HYXcq Dec 3 08:03:16 np0005543227 certmonger[41282]: hf1K3T0AN/eIjj3qrTs48Fh21umqA1YSOFuk43s/qaHkjbvhu1yviWkY3Tp5wVSy Dec 3 08:03:16 np0005543227 certmonger[41282]: xM6XJWFzEj1nifH+jgSNAo7lTVTT8jfkCFyq7zpidZGACkz1r0QM72zLsA== Dec 3 08:03:16 np0005543227 certmonger[41282]: -----END CERTIFICATE----- Dec 3 08:03:16 np0005543227 certmonger[41282]: ". Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Certificate submission still ongoing. Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Certificate submission postprocessing complete. Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Child status = 0. Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Child output: Dec 3 08:03:16 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nxM6XJWFzEj1nifH+jgSNAo7lTVTT8jfkCFyq7zpidZGACkz1r0QM72zLsA==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:16 np0005543227 certmonger[38965]: " Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:16 np0005543227 certmonger[38965]: MIIFZzCCA8+gAwIBAgIBLDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:16 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:16 np0005543227 certmonger[38965]: MDMxNloXDTI3MTIwNDA4MDMxNlowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Dec 3 08:03:16 np0005543227 certmonger[38965]: BAMMHW5wMDAwNTU0MzIyNy5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Dec 3 08:03:16 np0005543227 certmonger[38965]: AQEFAAOCAQ8AMIIBCgKCAQEAwIihSddUDWwQB2f8/nrzpyv2OKJNCNSgDHOCBhj5 Dec 3 08:03:16 np0005543227 certmonger[38965]: EvueGKPajC0F75l300kwNiKT4fKZKnLU/WTM0FuMPxSBZ6iLHd6EuyZrIKqYJhE9 Dec 3 08:03:16 np0005543227 certmonger[38965]: ZBxVcUgdMTrWrB7oiNEOH0MavNKYPZoVdBo33bi+SkvcMtkQY1A+38seJnEh3whq Dec 3 08:03:16 np0005543227 certmonger[38965]: j0hjONbtKNyDxKA0/aNX/s712ZVZ9HtUMtp5zE4o6eRoMz0gYUcnjhgIqoepxI+R Dec 3 08:03:16 np0005543227 certmonger[38965]: BRdsbhJSimMWbUmufiE/DMapdMwz4+nx7Fs45Doovzv1jnWNfgBn8ANXEeGOrDsR Dec 3 08:03:16 np0005543227 certmonger[38965]: HNe+TxV+H/0RT/8OdUvwFnPPAkrWbKW5y4lrCvHO+DvckwIDAQABo4IB/DCCAfgw Dec 3 08:03:16 np0005543227 certmonger[38965]: HwYDVR0jBBgwFoAUgs+mIG/OYclIvtpk0Uqf3Yur7XkwOgYIKwYBBQUHAQEELjAs Dec 3 08:03:16 np0005543227 certmonger[38965]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Dec 3 08:03:16 np0005543227 certmonger[38965]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Dec 3 08:03:16 np0005543227 certmonger[38965]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Dec 3 08:03:16 np0005543227 certmonger[38965]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Dec 3 08:03:16 np0005543227 certmonger[38965]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUe9dZpgGP1k00pAfrZJ8o6HsZOEkw Dec 3 08:03:16 np0005543227 certmonger[38965]: gdUGA1UdEQSBzTCByoIdbnAwMDA1NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3SCGm92 Dec 3 08:03:16 np0005543227 certmonger[38965]: ZXJjbG91ZC5zdG9yYWdlLm9vby50ZXN0oD4GCisGAQQBgjcUAgOgMAwuaGFwcm94 Dec 3 08:03:16 np0005543227 certmonger[38965]: eS9ucDAwMDU1NDMyMjcuc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBNBgYrBgEF Dec 3 08:03:16 np0005543227 certmonger[38965]: AgKgQzBBoAobCE9PTy5URVNUoTMwMaADAgEBoSowKBsHaGFwcm94eRsdbnAwMDA1 Dec 3 08:03:16 np0005543227 certmonger[38965]: NTQzMjI3LnN0b3JhZ2Uub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAIWQeU1Y Dec 3 08:03:16 np0005543227 certmonger[38965]: zIzlPOnpACu8dMFsLPhSRcKgd+NmYZt2/gcgcaJ5Kvytf+ucuHSLdDcW1BYxqOk0 Dec 3 08:03:16 np0005543227 certmonger[38965]: nW6+RRZeaMEKli2ZYkXvsBM/wjYpCuf58rvyMBWiLi5fxyI+7pO7OSFztW3bxBeY Dec 3 08:03:16 np0005543227 certmonger[38965]: TtbMyBh76925FvEfW+0Z+JNVUxlQQ2EZDE0c3z7Nq4Ji/jizY8zmjCWG6Gj7E9n3 Dec 3 08:03:16 np0005543227 certmonger[38965]: zbewMU76Wb6lMkstS1sX5T2Sak1xbrOXqKIOIfhWl1HG0qOITLgKFKjUc2G7Syyn Dec 3 08:03:16 np0005543227 certmonger[38965]: MiSkXXQXMdLzq5+zeLN/ZXMSdKbMXYPxu8ISWqBGZjCfqVIyej0l1n5M4yvaUvYx Dec 3 08:03:16 np0005543227 certmonger[38965]: Mowlfj70GfcFeuiDl2UBPQ8SIPUahqzBozTT5Yoyf9wwzNhjtMUhxowbaQ3HYXcq Dec 3 08:03:16 np0005543227 certmonger[38965]: hf1K3T0AN/eIjj3qrTs48Fh21umqA1YSOFuk43s/qaHkjbvhu1yviWkY3Tp5wVSy Dec 3 08:03:16 np0005543227 certmonger[38965]: xM6XJWFzEj1nifH+jgSNAo7lTVTT8jfkCFyq7zpidZGACkz1r0QM72zLsA== Dec 3 08:03:16 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:16 np0005543227 certmonger[38965]: ". Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] No hooks set for pre-save command. Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 certmonger[38965]: 2025-12-03 08:03:16 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:16 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:17 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:17 np0005543227 certmonger[38965]: 2025-12-03 08:03:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:17 np0005543227 certmonger[38965]: 2025-12-03 08:03:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:17 np0005543227 certmonger[41351]: Certificate in file "/etc/pki/tls/certs/haproxy-storage-cert.crt" issued by CA and saved. Dec 3 08:03:17 np0005543227 certmonger[38965]: 2025-12-03 08:03:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080315 Dec 3 08:03:17 np0005543227 python3[41367]: ansible-certificate_request Invoked with name=haproxy-storage_mgmt-cert dns=['np0005543227.storagemgmt.ooo.test', 'overcloud.storagemgmt.ooo.test'] principal=['haproxy/np0005543227.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012cp "/etc/pki/tls/private/haproxy-storage_mgmt-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-storage_mgmt.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-storage_mgmt.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:17 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.storagemgmt.ooo.test" for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.storagemgmt.ooo.test Dec 3 08:03:18 np0005543227 certmonger[41377]: overcloud.storagemgmt.ooo.test Dec 3 08:03:18 np0005543227 certmonger[41377]: " for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005543227.storagemgmt.ooo.test@OOO.TEST Dec 3 08:03:18 np0005543227 certmonger[41377]: " for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:18 np0005543227 certmonger[41377]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LnN0b3JhZ2VtZ210 Dec 3 08:03:18 np0005543227 certmonger[41377]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmPLzPG5p Dec 3 08:03:18 np0005543227 certmonger[41377]: gZAhYejzoALgmTKBhBG/iX+0Fq/51udMfC8ICZETGQShnBBJx/RP16MFjOFRahng Dec 3 08:03:18 np0005543227 certmonger[41377]: 9gWHW3+PYx+BGGnRSqApbRiyyRqAeuRBzXesaVoG0fVJ5A8DBCib0N1BuE1SE9nc Dec 3 08:03:18 np0005543227 certmonger[41377]: hv++qbM2UcyM3H7p/4lfygiR3BPzWvw4ZQNj0ecgpHNPJseWV9iBQelFikmjZUU+ Dec 3 08:03:18 np0005543227 certmonger[41377]: 83tMDlZJYRjZrZXJkyW09o5Sp/RdLN3Zjw02J9bkXXLkUTHKng4F8pzsX7t+ol9c Dec 3 08:03:18 np0005543227 certmonger[41377]: h+fs0CK2qoEpRxmXt+vHaequaYuM8WQ1A7WjobJntqdMSHmJXKopbXbFXFYuC5NB Dec 3 08:03:18 np0005543227 certmonger[41377]: BERLpRIwuwK2QQIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:03:18 np0005543227 certmonger[41377]: ADAAMwAwADgAMAAzADEAODCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Dec 3 08:03:18 np0005543227 certmonger[41377]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU1NDMyMjcuc3RvcmFnZW1nbXQub29v Dec 3 08:03:18 np0005543227 certmonger[41377]: LnRlc3SCHm92ZXJjbG91ZC5zdG9yYWdlbWdtdC5vb28udGVzdKBCBgorBgEEAYI3 Dec 3 08:03:18 np0005543227 certmonger[41377]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NTQzMjI3LnN0b3JhZ2VtZ210Lm9vby50ZXN0 Dec 3 08:03:18 np0005543227 certmonger[41377]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Dec 3 08:03:18 np0005543227 certmonger[41377]: GwdoYXByb3h5GyFucDAwMDU1NDMyMjcuc3RvcmFnZW1nbXQub29vLnRlc3QwHQYD Dec 3 08:03:18 np0005543227 certmonger[41377]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Dec 3 08:03:18 np0005543227 certmonger[41377]: BBYEFGy9xM/lZwBUu+3Lb5Gz/PoLRQTdMA0GCSqGSIb3DQEBCwUAA4IBAQB7loW5 Dec 3 08:03:18 np0005543227 certmonger[41377]: ppOyxu8tDuvYHXZkR54TdSlkdCcQkAGaUyC23vkopr7grQPtoDmNj6aKjRCSLN/r Dec 3 08:03:18 np0005543227 certmonger[41377]: c2jJ7AcsbhMnVGD5sO5bmPwXKgyncVgNZsH4bkno+YiGggQGjn0XOR/m9/GG25Fk Dec 3 08:03:18 np0005543227 certmonger[41377]: 4GDZpRe+Z8XmdWEMuxeeA/3Ztip7N8ReiChzFTWIl+rYO5wIlsTS34CIBPbliU61 Dec 3 08:03:18 np0005543227 certmonger[41377]: moO/kNRMerHiQ1bK6+LrUgbU9l6X2iE4iW7FJebMQ0ODQqlL113ZzABb0salf3lQ Dec 3 08:03:18 np0005543227 certmonger[41377]: r/TL/W2YompK9PzSJgxzs4DW8wglrZpYKgwo9Q8c8tlRvmyZgUpP09+fd9eJG9hB Dec 3 08:03:18 np0005543227 certmonger[41377]: lq1qeUmiNZnIFfw9 Dec 3 08:03:18 np0005543227 certmonger[41377]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:18 np0005543227 certmonger[41377]: " for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmPLzPG5pgZAhYejzoALgmTKBhBG/iX+0Fq/51udMfC8ICZETGQShnBBJx/RP16MFjOFRahng9gWHW3+PYx+BGGnRSqApbRiyyRqAeuRBzXesaVoG0fVJ5A8DBCib0N1BuE1SE9nchv++qbM2UcyM3H7p/4lfygiR3BPzWvw4ZQNj0ecgpHNPJseWV9iBQelFikmjZUU+83tMDlZJYRjZrZXJkyW09o5Sp/RdLN3Zjw02J9bkXXLkUTHKng4F8pzsX7t+ol9ch+fs0CK2qoEpRxmXt+vHaequaYuM8WQ1A7WjobJntqdMSHmJXKopbXbFXFYuC5NBBERLpRIwuwK2QQIDAQAB" for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:18 np0005543227 certmonger[41377]: 2025-12-03 08:03:18 [41377] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[41377]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:18 np0005543227 certmonger[41377]: Certificate: "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" Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Certificate submission still ongoing. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Certificate submission attempt complete. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Child status = 0. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Child output: Dec 3 08:03:18 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:18 np0005543227 certmonger[38965]: MIIFezCCA+OgAwIBAgIBLjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:18 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:18 np0005543227 certmonger[38965]: MDMxOFoXDTI3MTIwNDA4MDMxOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:18 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:18 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAJjy8zxuaYGQIWHo86AC4JkygYQRv4l/tBav Dec 3 08:03:18 np0005543227 certmonger[38965]: +dbnTHwvCAmRExkEoZwQScf0T9ejBYzhUWoZ4PYFh1t/j2MfgRhp0UqgKW0Ysska Dec 3 08:03:18 np0005543227 certmonger[38965]: gHrkQc13rGlaBtH1SeQPAwQom9DdQbhNUhPZ3Ib/vqmzNlHMjNx+6f+JX8oIkdwT Dec 3 08:03:18 np0005543227 certmonger[38965]: 81r8OGUDY9HnIKRzTybHllfYgUHpRYpJo2VFPvN7TA5WSWEY2a2VyZMltPaOUqf0 Dec 3 08:03:18 np0005543227 certmonger[38965]: XSzd2Y8NNifW5F1y5FExyp4OBfKc7F+7fqJfXIfn7NAitqqBKUcZl7frx2nqrmmL Dec 3 08:03:18 np0005543227 certmonger[38965]: jPFkNQO1o6GyZ7anTEh5iVyqKW12xVxWLguTQQRES6USMLsCtkECAwEAAaOCAgww Dec 3 08:03:18 np0005543227 certmonger[38965]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:18 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:18 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:18 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:18 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:18 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHgYbH3/knhmoQmLGNN5byyR Dec 3 08:03:18 np0005543227 certmonger[38965]: wTtoMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28u Dec 3 08:03:18 np0005543227 certmonger[38965]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:18 np0005543227 certmonger[38965]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjcuc3RvcmFnZW1nbXQub29vLnRlc3RA Dec 3 08:03:18 np0005543227 certmonger[38965]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:18 np0005543227 certmonger[38965]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Dec 3 08:03:18 np0005543227 certmonger[38965]: hkiG9w0BAQsFAAOCAYEAFT+OaVfVe/tLgstxVXX/i20UqbT1rC3WSXYTyTZ45WPy Dec 3 08:03:18 np0005543227 certmonger[38965]: HlVvfqoXi80XL9dObiEOvW9Oi/OV3WBjA66kureFiCbU8SPCajTHFQv+E6vGWHkI Dec 3 08:03:18 np0005543227 certmonger[38965]: ShHY+uNISWlaGhx/rzvfnAAsQjQrYLoaXsG+5puxGRIm11L/LOF3jO7I3BLkwuyi Dec 3 08:03:18 np0005543227 certmonger[38965]: IVJUhP8OZmz45Bv4OHjfwsYeekcfr4oR7LJeynlK+vE35tplg7XHcHG6zHZWmtWP Dec 3 08:03:18 np0005543227 certmonger[38965]: ggJwuqR35pcVwiR91d8YrtnDbWxLWqGqAnzF40FH6VKWcs8t9M8N3hSMySrH2f5D Dec 3 08:03:18 np0005543227 certmonger[38965]: XHhpx9TQRK1oZLjfcKrKaSkE+/cxAdB3ikH7ZAqr8EIhbBPhC1BsJT4PpDl8oZWt Dec 3 08:03:18 np0005543227 certmonger[38965]: rY1LTkRRaKjCRd3nOWHupOFeY3j9CUOBsD1qGBXS1jN5Tjt/IZtLFdv9xAsiQdvQ Dec 3 08:03:18 np0005543227 certmonger[38965]: opG7c2j3JGB6txmqoc23khUQFJkoTxwnNVhiCazxM1Nl3cwJEQDPHckHVQ6BjFBL Dec 3 08:03:18 np0005543227 certmonger[38965]: rJNCzA23T+yt2gDg1UVm Dec 3 08:03:18 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:18 np0005543227 certmonger[38965]: " Dec 3 08:03:18 np0005543227 certmonger[41379]: 2025-12-03 08:03:18 [41379] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:18 np0005543227 certmonger[41379]: MIIFezCCA+OgAwIBAgIBLjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:18 np0005543227 certmonger[41379]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:18 np0005543227 certmonger[41379]: MDMxOFoXDTI3MTIwNDA4MDMxOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:18 np0005543227 certmonger[41379]: BAMMIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:18 np0005543227 certmonger[41379]: hvcNAQEBBQADggEPADCCAQoCggEBAJjy8zxuaYGQIWHo86AC4JkygYQRv4l/tBav Dec 3 08:03:18 np0005543227 certmonger[41379]: +dbnTHwvCAmRExkEoZwQScf0T9ejBYzhUWoZ4PYFh1t/j2MfgRhp0UqgKW0Ysska Dec 3 08:03:18 np0005543227 certmonger[41379]: gHrkQc13rGlaBtH1SeQPAwQom9DdQbhNUhPZ3Ib/vqmzNlHMjNx+6f+JX8oIkdwT Dec 3 08:03:18 np0005543227 certmonger[41379]: 81r8OGUDY9HnIKRzTybHllfYgUHpRYpJo2VFPvN7TA5WSWEY2a2VyZMltPaOUqf0 Dec 3 08:03:18 np0005543227 certmonger[41379]: XSzd2Y8NNifW5F1y5FExyp4OBfKc7F+7fqJfXIfn7NAitqqBKUcZl7frx2nqrmmL Dec 3 08:03:18 np0005543227 certmonger[41379]: jPFkNQO1o6GyZ7anTEh5iVyqKW12xVxWLguTQQRES6USMLsCtkECAwEAAaOCAgww Dec 3 08:03:18 np0005543227 certmonger[41379]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:18 np0005543227 certmonger[41379]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:18 np0005543227 certmonger[41379]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:18 np0005543227 certmonger[41379]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:18 np0005543227 certmonger[41379]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:18 np0005543227 certmonger[41379]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHgYbH3/knhmoQmLGNN5byyR Dec 3 08:03:18 np0005543227 certmonger[41379]: wTtoMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28u Dec 3 08:03:18 np0005543227 certmonger[41379]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:18 np0005543227 certmonger[41379]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjcuc3RvcmFnZW1nbXQub29vLnRlc3RA Dec 3 08:03:18 np0005543227 certmonger[41379]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:18 np0005543227 certmonger[41379]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Dec 3 08:03:18 np0005543227 certmonger[41379]: hkiG9w0BAQsFAAOCAYEAFT+OaVfVe/tLgstxVXX/i20UqbT1rC3WSXYTyTZ45WPy Dec 3 08:03:18 np0005543227 certmonger[41379]: HlVvfqoXi80XL9dObiEOvW9Oi/OV3WBjA66kureFiCbU8SPCajTHFQv+E6vGWHkI Dec 3 08:03:18 np0005543227 certmonger[41379]: ShHY+uNISWlaGhx/rzvfnAAsQjQrYLoaXsG+5puxGRIm11L/LOF3jO7I3BLkwuyi Dec 3 08:03:18 np0005543227 certmonger[41379]: IVJUhP8OZmz45Bv4OHjfwsYeekcfr4oR7LJeynlK+vE35tplg7XHcHG6zHZWmtWP Dec 3 08:03:18 np0005543227 certmonger[41379]: ggJwuqR35pcVwiR91d8YrtnDbWxLWqGqAnzF40FH6VKWcs8t9M8N3hSMySrH2f5D Dec 3 08:03:18 np0005543227 certmonger[41379]: XHhpx9TQRK1oZLjfcKrKaSkE+/cxAdB3ikH7ZAqr8EIhbBPhC1BsJT4PpDl8oZWt Dec 3 08:03:18 np0005543227 certmonger[41379]: rY1LTkRRaKjCRd3nOWHupOFeY3j9CUOBsD1qGBXS1jN5Tjt/IZtLFdv9xAsiQdvQ Dec 3 08:03:18 np0005543227 certmonger[41379]: opG7c2j3JGB6txmqoc23khUQFJkoTxwnNVhiCazxM1Nl3cwJEQDPHckHVQ6BjFBL Dec 3 08:03:18 np0005543227 certmonger[41379]: rJNCzA23T+yt2gDg1UVm Dec 3 08:03:18 np0005543227 certmonger[41379]: -----END CERTIFICATE----- Dec 3 08:03:18 np0005543227 certmonger[41379]: ". Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Certificate submission still ongoing. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Certificate submission postprocessing complete. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Child status = 0. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Child output: Dec 3 08:03:18 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nrJNCzA23T+yt2gDg1UVm\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:18 np0005543227 certmonger[38965]: " Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:18 np0005543227 certmonger[38965]: MIIFezCCA+OgAwIBAgIBLjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:18 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:18 np0005543227 certmonger[38965]: MDMxOFoXDTI3MTIwNDA4MDMxOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:18 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:18 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAJjy8zxuaYGQIWHo86AC4JkygYQRv4l/tBav Dec 3 08:03:18 np0005543227 certmonger[38965]: +dbnTHwvCAmRExkEoZwQScf0T9ejBYzhUWoZ4PYFh1t/j2MfgRhp0UqgKW0Ysska Dec 3 08:03:18 np0005543227 certmonger[38965]: gHrkQc13rGlaBtH1SeQPAwQom9DdQbhNUhPZ3Ib/vqmzNlHMjNx+6f+JX8oIkdwT Dec 3 08:03:18 np0005543227 certmonger[38965]: 81r8OGUDY9HnIKRzTybHllfYgUHpRYpJo2VFPvN7TA5WSWEY2a2VyZMltPaOUqf0 Dec 3 08:03:18 np0005543227 certmonger[38965]: XSzd2Y8NNifW5F1y5FExyp4OBfKc7F+7fqJfXIfn7NAitqqBKUcZl7frx2nqrmmL Dec 3 08:03:18 np0005543227 certmonger[38965]: jPFkNQO1o6GyZ7anTEh5iVyqKW12xVxWLguTQQRES6USMLsCtkECAwEAAaOCAgww Dec 3 08:03:18 np0005543227 certmonger[38965]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:18 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:18 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:18 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:18 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:18 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFHgYbH3/knhmoQmLGNN5byyR Dec 3 08:03:18 np0005543227 certmonger[38965]: wTtoMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28u Dec 3 08:03:18 np0005543227 certmonger[38965]: dGVzdIIeb3ZlcmNsb3VkLnN0b3JhZ2VtZ210Lm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:18 np0005543227 certmonger[38965]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjcuc3RvcmFnZW1nbXQub29vLnRlc3RA Dec 3 08:03:18 np0005543227 certmonger[38965]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:18 np0005543227 certmonger[38965]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNy5zdG9yYWdlbWdtdC5vb28udGVzdDANBgkq Dec 3 08:03:18 np0005543227 certmonger[38965]: hkiG9w0BAQsFAAOCAYEAFT+OaVfVe/tLgstxVXX/i20UqbT1rC3WSXYTyTZ45WPy Dec 3 08:03:18 np0005543227 certmonger[38965]: HlVvfqoXi80XL9dObiEOvW9Oi/OV3WBjA66kureFiCbU8SPCajTHFQv+E6vGWHkI Dec 3 08:03:18 np0005543227 certmonger[38965]: ShHY+uNISWlaGhx/rzvfnAAsQjQrYLoaXsG+5puxGRIm11L/LOF3jO7I3BLkwuyi Dec 3 08:03:18 np0005543227 certmonger[38965]: IVJUhP8OZmz45Bv4OHjfwsYeekcfr4oR7LJeynlK+vE35tplg7XHcHG6zHZWmtWP Dec 3 08:03:18 np0005543227 certmonger[38965]: ggJwuqR35pcVwiR91d8YrtnDbWxLWqGqAnzF40FH6VKWcs8t9M8N3hSMySrH2f5D Dec 3 08:03:18 np0005543227 certmonger[38965]: XHhpx9TQRK1oZLjfcKrKaSkE+/cxAdB3ikH7ZAqr8EIhbBPhC1BsJT4PpDl8oZWt Dec 3 08:03:18 np0005543227 certmonger[38965]: rY1LTkRRaKjCRd3nOWHupOFeY3j9CUOBsD1qGBXS1jN5Tjt/IZtLFdv9xAsiQdvQ Dec 3 08:03:18 np0005543227 certmonger[38965]: opG7c2j3JGB6txmqoc23khUQFJkoTxwnNVhiCazxM1Nl3cwJEQDPHckHVQ6BjFBL Dec 3 08:03:18 np0005543227 certmonger[38965]: rJNCzA23T+yt2gDg1UVm Dec 3 08:03:18 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:18 np0005543227 certmonger[38965]: ". Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] No hooks set for pre-save command. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:18 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:18 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:18 np0005543227 certmonger[41449]: Certificate in file "/etc/pki/tls/certs/haproxy-storage_mgmt-cert.crt" issued by CA and saved. Dec 3 08:03:18 np0005543227 certmonger[38965]: 2025-12-03 08:03:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080318 Dec 3 08:03:19 np0005543227 python3[41465]: ansible-certificate_request Invoked with name=haproxy-internal_api-cert dns=['np0005543227.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['haproxy/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012cp "/etc/pki/tls/private/haproxy-internal_api-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012#012ca_path="/etc/ipa/ca.crt"#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-internal_api.key"#012service_pem="/etc/pki/tls/certs/haproxy/overcloud-haproxy-internal_api.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:03:19 np0005543227 certmonger[41475]: overcloud.internalapi.ooo.test Dec 3 08:03:19 np0005543227 certmonger[41475]: " for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:03:19 np0005543227 certmonger[41475]: " for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:19 np0005543227 certmonger[41475]: MIID+DCCAuACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:03:19 np0005543227 certmonger[41475]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0PuJy7gK Dec 3 08:03:19 np0005543227 certmonger[41475]: I5DSpFTxtkAcbuKgnOLFAv/dBsOZVDMEiD2FZguiwMHyvLxCjLbd8hUJ7XW3freX Dec 3 08:03:19 np0005543227 certmonger[41475]: G0Dh6pIzB2CTrI70gzNlbEnS226WJiTKncJUSDkxkNHxHdw2occIftcLawOKDGwh Dec 3 08:03:19 np0005543227 certmonger[41475]: XmV+QkvDNhayyhT52Swr7JOd3lmomq42bFSGkkDCKZ+6wLfBV7mxTsxVIhdNTTB0 Dec 3 08:03:19 np0005543227 certmonger[41475]: AF/3gkaFjqfD0XARZOccLwraS+1ZWXjD3G+blDDZMCPRzOxLyBZNS5iP2J3uDuaU Dec 3 08:03:19 np0005543227 certmonger[41475]: p994vjcTZ6aTRvasQ+AgDo18YoyPBYLqxCPuEBCCMjGuBWuhLmNn+ubxk5Fd3zlH Dec 3 08:03:19 np0005543227 certmonger[41475]: 3/5ISBLYdYNP3QIDAQABoIIBhTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:03:19 np0005543227 certmonger[41475]: ADAAMwAwADgAMAAzADEAOTCCAVQGCSqGSIb3DQEJDjGCAUUwggFBMAsGA1UdDwQE Dec 3 08:03:19 np0005543227 certmonger[41475]: AwIFoDCB5QYDVR0RBIHdMIHagiFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:03:19 np0005543227 certmonger[41475]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBCBgorBgEEAYI3 Dec 3 08:03:19 np0005543227 certmonger[41475]: FAIDoDQMMmhhcHJveHkvbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0 Dec 3 08:03:19 np0005543227 certmonger[41475]: QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRFU1ShNzA1oAMCAQGhLjAs Dec 3 08:03:19 np0005543227 certmonger[41475]: GwdoYXByb3h5GyFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYD Dec 3 08:03:19 np0005543227 certmonger[41475]: VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O Dec 3 08:03:19 np0005543227 certmonger[41475]: BBYEFBGYqF3kLUMi7BuIZgvqm46DOiG0MA0GCSqGSIb3DQEBCwUAA4IBAQCRac4I Dec 3 08:03:19 np0005543227 certmonger[41475]: YdKtUNsLk1YiXBzWrWsLK9cLCFxn7U6Nw6N1fSN2FXnaSb+Ctb/wUyU8/8TGYQbR Dec 3 08:03:19 np0005543227 certmonger[41475]: IX0cVh+r/Be5dOQp5ZigaNlLq7MwnnaBzLaI0a0lhgBsFUOVGT1Kdu9bzJC0hqDm Dec 3 08:03:19 np0005543227 certmonger[41475]: n7YyhsuSxFHqOxPP5inMob03hvKtuAm8eqX0ZneZiTi4KdtcOKQ0fD8of3ayN3k/ Dec 3 08:03:19 np0005543227 certmonger[41475]: zVV2YlS6nJ/wszXNcBvFPfU8btF5VYVsFctdJdRVqBEg4qfZ47JtwAHQVGIykSaf Dec 3 08:03:19 np0005543227 certmonger[41475]: OULz0zhrvv8YWd0da06IQFdBz+ScPmJrAU7H3GqjU7/ECVd2awuBOE6idsVxeYpw Dec 3 08:03:19 np0005543227 certmonger[41475]: +kFUu/N7fV2TVAlF Dec 3 08:03:19 np0005543227 certmonger[41475]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:19 np0005543227 certmonger[41475]: " for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDQ+4nLuAojkNKkVPG2QBxu4qCc4sUC/90Gw5lUMwSIPYVmC6LAwfK8vEKMtt3yFQntdbd+t5cbQOHqkjMHYJOsjvSDM2VsSdLbbpYmJMqdwlRIOTGQ0fEd3Dahxwh+1wtrA4oMbCFeZX5CS8M2FrLKFPnZLCvsk53eWaiarjZsVIaSQMIpn7rAt8FXubFOzFUiF01NMHQAX/eCRoWOp8PRcBFk5xwvCtpL7VlZeMPcb5uUMNkwI9HM7EvIFk1LmI/Yne4O5pSn33i+NxNnppNG9qxD4CAOjXxijI8FgurEI+4QEIIyMa4Fa6EuY2f65vGTkV3fOUff/khIEth1g0/dAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAV3pKa6JyFXDj7BfmmlT+8qsQIi2KWCzfGGQpWUylL/XrT7sr5L2KzfGcMx2597hS70e+kvAmeKBwo4WOoJfNLjfpUwha7rG2paOdUecB4aCmfSNcTRExyyyz1nBKi/99ICbTNeonKGFUG9HdS8Bimu8gRglb6cicChwZ0HAdVnJEZojfJk3TBpOpor1+TXVi8qMfBqHZX6cWouY2wXtnhvkkUDs8P+EVK4YS+g/noRCJq8lE/FcTBNVEZsvgRwrX/tw6Htffet8Uj2jCywa8kUyE0D2FScYcmWx8sc8Ob9Bakf+0/QFvr/u1c/VmTVddPYR8s8qv8NAE6uq95RLYiA==" for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0PuJy7gKI5DSpFTxtkAcbuKgnOLFAv/dBsOZVDMEiD2FZguiwMHyvLxCjLbd8hUJ7XW3freXG0Dh6pIzB2CTrI70gzNlbEnS226WJiTKncJUSDkxkNHxHdw2occIftcLawOKDGwhXmV+QkvDNhayyhT52Swr7JOd3lmomq42bFSGkkDCKZ+6wLfBV7mxTsxVIhdNTTB0AF/3gkaFjqfD0XARZOccLwraS+1ZWXjD3G+blDDZMCPRzOxLyBZNS5iP2J3uDuaUp994vjcTZ6aTRvasQ+AgDo18YoyPBYLqxCPuEBCCMjGuBWuhLmNn+ubxk5Fd3zlH3/5ISBLYdYNP3QIDAQAB" for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:19 np0005543227 certmonger[41475]: 2025-12-03 08:03:19 [41475] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:19 np0005543227 certmonger[38965]: 2025-12-03 08:03:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:19 np0005543227 certmonger[41475]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:21 np0005543227 certmonger[41475]: Certificate: "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" Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Certificate submission still ongoing. Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Certificate submission attempt complete. Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Child status = 0. Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Child output: Dec 3 08:03:21 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:21 np0005543227 certmonger[38965]: MIIFezCCA+OgAwIBAgIBMDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:21 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:21 np0005543227 certmonger[38965]: MDMyMFoXDTI3MTIwNDA4MDMyMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:21 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:21 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAND7icu4CiOQ0qRU8bZAHG7ioJzixQL/3QbD Dec 3 08:03:21 np0005543227 certmonger[38965]: mVQzBIg9hWYLosDB8ry8Qoy23fIVCe11t363lxtA4eqSMwdgk6yO9IMzZWxJ0ttu Dec 3 08:03:21 np0005543227 certmonger[38965]: liYkyp3CVEg5MZDR8R3cNqHHCH7XC2sDigxsIV5lfkJLwzYWssoU+dksK+yTnd5Z Dec 3 08:03:21 np0005543227 certmonger[38965]: qJquNmxUhpJAwimfusC3wVe5sU7MVSIXTU0wdABf94JGhY6nw9FwEWTnHC8K2kvt Dec 3 08:03:21 np0005543227 certmonger[38965]: WVl4w9xvm5Qw2TAj0czsS8gWTUuYj9id7g7mlKffeL43E2emk0b2rEPgIA6NfGKM Dec 3 08:03:21 np0005543227 certmonger[38965]: jwWC6sQj7hAQgjIxrgVroS5jZ/rm8ZORXd85R9/+SEgS2HWDT90CAwEAAaOCAgww Dec 3 08:03:21 np0005543227 certmonger[38965]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:21 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:21 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:21 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:21 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:21 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMsq6SZQvecOdYy3tU6waMUJ Dec 3 08:03:21 np0005543227 certmonger[38965]: y8SNMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:21 np0005543227 certmonger[38965]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:21 np0005543227 certmonger[38965]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29vLnRlc3RA Dec 3 08:03:21 np0005543227 certmonger[38965]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:21 np0005543227 certmonger[38965]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Dec 3 08:03:21 np0005543227 certmonger[38965]: hkiG9w0BAQsFAAOCAYEAPPcyo7zYi1HpNuLiVLgbOyBByBsY+7TlKpUWfPZCf0GX Dec 3 08:03:21 np0005543227 certmonger[38965]: QlfSsQtmK/W3DQd+glu4b2+kqgjJeqkr9zubwUiEI9z+Moxvb0VEda2C4E8jBt1S Dec 3 08:03:21 np0005543227 certmonger[38965]: u4Ov6pEmXNbU/WAG0HdidXZE+EVHy671qh+8b8qfPX04TyRqzRuVLuYxjgn/4h4g Dec 3 08:03:21 np0005543227 certmonger[38965]: iztryAubK/jlsy0HQw2zPQvf1EJe36GMWhSjSv4Myao/3AJ/GazbQv9RC93nuHoM Dec 3 08:03:21 np0005543227 certmonger[38965]: /myHbuQ/yVPlDOdHg7evK9vC8iEU58b9QhC4htgmZkrlq0CMJ/wzcofV9Vz8H2iw Dec 3 08:03:21 np0005543227 certmonger[38965]: 4zthwG1FPZTu9SwrUEh+KFFurRw/B39siHXVjWFSO2rHDCRXEnfaUQQQa0C88kIb Dec 3 08:03:21 np0005543227 certmonger[38965]: u4Nt8w+dp6nxWi4NYgY+kb3lHhIEGlvvfeG+T9+pw9F69jXHNuSTMy7ZnA8B9NJC Dec 3 08:03:21 np0005543227 certmonger[38965]: At4hiOFRHRb3feNIHvVT+1EiK1mgR1YIuBJYSW8ygOIUJmVF9579k0QI2nvO2rrS Dec 3 08:03:21 np0005543227 certmonger[38965]: LH+JcwAaSR65ifXDwgBw Dec 3 08:03:21 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:21 np0005543227 certmonger[38965]: " Dec 3 08:03:21 np0005543227 certmonger[41515]: 2025-12-03 08:03:21 [41515] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:21 np0005543227 certmonger[41515]: MIIFezCCA+OgAwIBAgIBMDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:21 np0005543227 certmonger[41515]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:21 np0005543227 certmonger[41515]: MDMyMFoXDTI3MTIwNDA4MDMyMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:21 np0005543227 certmonger[41515]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:21 np0005543227 certmonger[41515]: hvcNAQEBBQADggEPADCCAQoCggEBAND7icu4CiOQ0qRU8bZAHG7ioJzixQL/3QbD Dec 3 08:03:21 np0005543227 certmonger[41515]: mVQzBIg9hWYLosDB8ry8Qoy23fIVCe11t363lxtA4eqSMwdgk6yO9IMzZWxJ0ttu Dec 3 08:03:21 np0005543227 certmonger[41515]: liYkyp3CVEg5MZDR8R3cNqHHCH7XC2sDigxsIV5lfkJLwzYWssoU+dksK+yTnd5Z Dec 3 08:03:21 np0005543227 certmonger[41515]: qJquNmxUhpJAwimfusC3wVe5sU7MVSIXTU0wdABf94JGhY6nw9FwEWTnHC8K2kvt Dec 3 08:03:21 np0005543227 certmonger[41515]: WVl4w9xvm5Qw2TAj0czsS8gWTUuYj9id7g7mlKffeL43E2emk0b2rEPgIA6NfGKM Dec 3 08:03:21 np0005543227 certmonger[41515]: jwWC6sQj7hAQgjIxrgVroS5jZ/rm8ZORXd85R9/+SEgS2HWDT90CAwEAAaOCAgww Dec 3 08:03:21 np0005543227 certmonger[41515]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:21 np0005543227 certmonger[41515]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:21 np0005543227 certmonger[41515]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:21 np0005543227 certmonger[41515]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:21 np0005543227 certmonger[41515]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:21 np0005543227 certmonger[41515]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMsq6SZQvecOdYy3tU6waMUJ Dec 3 08:03:21 np0005543227 certmonger[41515]: y8SNMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:21 np0005543227 certmonger[41515]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:21 np0005543227 certmonger[41515]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29vLnRlc3RA Dec 3 08:03:21 np0005543227 certmonger[41515]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:21 np0005543227 certmonger[41515]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Dec 3 08:03:21 np0005543227 certmonger[41515]: hkiG9w0BAQsFAAOCAYEAPPcyo7zYi1HpNuLiVLgbOyBByBsY+7TlKpUWfPZCf0GX Dec 3 08:03:21 np0005543227 certmonger[41515]: QlfSsQtmK/W3DQd+glu4b2+kqgjJeqkr9zubwUiEI9z+Moxvb0VEda2C4E8jBt1S Dec 3 08:03:21 np0005543227 certmonger[41515]: u4Ov6pEmXNbU/WAG0HdidXZE+EVHy671qh+8b8qfPX04TyRqzRuVLuYxjgn/4h4g Dec 3 08:03:21 np0005543227 certmonger[41515]: iztryAubK/jlsy0HQw2zPQvf1EJe36GMWhSjSv4Myao/3AJ/GazbQv9RC93nuHoM Dec 3 08:03:21 np0005543227 certmonger[41515]: /myHbuQ/yVPlDOdHg7evK9vC8iEU58b9QhC4htgmZkrlq0CMJ/wzcofV9Vz8H2iw Dec 3 08:03:21 np0005543227 certmonger[41515]: 4zthwG1FPZTu9SwrUEh+KFFurRw/B39siHXVjWFSO2rHDCRXEnfaUQQQa0C88kIb Dec 3 08:03:21 np0005543227 certmonger[41515]: u4Nt8w+dp6nxWi4NYgY+kb3lHhIEGlvvfeG+T9+pw9F69jXHNuSTMy7ZnA8B9NJC Dec 3 08:03:21 np0005543227 certmonger[41515]: At4hiOFRHRb3feNIHvVT+1EiK1mgR1YIuBJYSW8ygOIUJmVF9579k0QI2nvO2rrS Dec 3 08:03:21 np0005543227 certmonger[41515]: LH+JcwAaSR65ifXDwgBw Dec 3 08:03:21 np0005543227 certmonger[41515]: -----END CERTIFICATE----- Dec 3 08:03:21 np0005543227 certmonger[41515]: ". Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Certificate submission still ongoing. Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Certificate submission postprocessing complete. Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Child status = 0. Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Child output: Dec 3 08:03:21 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nLH+JcwAaSR65ifXDwgBw\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:21 np0005543227 certmonger[38965]: " Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:21 np0005543227 certmonger[38965]: MIIFezCCA+OgAwIBAgIBMDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:21 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:21 np0005543227 certmonger[38965]: MDMyMFoXDTI3MTIwNDA4MDMyMFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:21 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:21 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAND7icu4CiOQ0qRU8bZAHG7ioJzixQL/3QbD Dec 3 08:03:21 np0005543227 certmonger[38965]: mVQzBIg9hWYLosDB8ry8Qoy23fIVCe11t363lxtA4eqSMwdgk6yO9IMzZWxJ0ttu Dec 3 08:03:21 np0005543227 certmonger[38965]: liYkyp3CVEg5MZDR8R3cNqHHCH7XC2sDigxsIV5lfkJLwzYWssoU+dksK+yTnd5Z Dec 3 08:03:21 np0005543227 certmonger[38965]: qJquNmxUhpJAwimfusC3wVe5sU7MVSIXTU0wdABf94JGhY6nw9FwEWTnHC8K2kvt Dec 3 08:03:21 np0005543227 certmonger[38965]: WVl4w9xvm5Qw2TAj0czsS8gWTUuYj9id7g7mlKffeL43E2emk0b2rEPgIA6NfGKM Dec 3 08:03:21 np0005543227 certmonger[38965]: jwWC6sQj7hAQgjIxrgVroS5jZ/rm8ZORXd85R9/+SEgS2HWDT90CAwEAAaOCAgww Dec 3 08:03:21 np0005543227 certmonger[38965]: ggIIMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:21 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:21 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:21 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:21 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:21 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMsq6SZQvecOdYy3tU6waMUJ Dec 3 08:03:21 np0005543227 certmonger[38965]: y8SNMIHlBgNVHREEgd0wgdqCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:21 np0005543227 certmonger[38965]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEIGCisGAQQBgjcU Dec 3 08:03:21 np0005543227 certmonger[38965]: AgOgNAwyaGFwcm94eS9ucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29vLnRlc3RA Dec 3 08:03:21 np0005543227 certmonger[38965]: T09PLlRFU1SgUQYGKwYBBQICoEcwRaAKGwhPT08uVEVTVKE3MDWgAwIBAaEuMCwb Dec 3 08:03:21 np0005543227 certmonger[38965]: B2hhcHJveHkbIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkq Dec 3 08:03:21 np0005543227 certmonger[38965]: hkiG9w0BAQsFAAOCAYEAPPcyo7zYi1HpNuLiVLgbOyBByBsY+7TlKpUWfPZCf0GX Dec 3 08:03:21 np0005543227 certmonger[38965]: QlfSsQtmK/W3DQd+glu4b2+kqgjJeqkr9zubwUiEI9z+Moxvb0VEda2C4E8jBt1S Dec 3 08:03:21 np0005543227 certmonger[38965]: u4Ov6pEmXNbU/WAG0HdidXZE+EVHy671qh+8b8qfPX04TyRqzRuVLuYxjgn/4h4g Dec 3 08:03:21 np0005543227 certmonger[38965]: iztryAubK/jlsy0HQw2zPQvf1EJe36GMWhSjSv4Myao/3AJ/GazbQv9RC93nuHoM Dec 3 08:03:21 np0005543227 certmonger[38965]: /myHbuQ/yVPlDOdHg7evK9vC8iEU58b9QhC4htgmZkrlq0CMJ/wzcofV9Vz8H2iw Dec 3 08:03:21 np0005543227 certmonger[38965]: 4zthwG1FPZTu9SwrUEh+KFFurRw/B39siHXVjWFSO2rHDCRXEnfaUQQQa0C88kIb Dec 3 08:03:21 np0005543227 certmonger[38965]: u4Nt8w+dp6nxWi4NYgY+kb3lHhIEGlvvfeG+T9+pw9F69jXHNuSTMy7ZnA8B9NJC Dec 3 08:03:21 np0005543227 certmonger[38965]: At4hiOFRHRb3feNIHvVT+1EiK1mgR1YIuBJYSW8ygOIUJmVF9579k0QI2nvO2rrS Dec 3 08:03:21 np0005543227 certmonger[38965]: LH+JcwAaSR65ifXDwgBw Dec 3 08:03:21 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:21 np0005543227 certmonger[38965]: ". Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] No hooks set for pre-save command. Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:21 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:21 np0005543227 certmonger[41582]: Certificate in file "/etc/pki/tls/certs/haproxy-internal_api-cert.crt" issued by CA and saved. Dec 3 08:03:21 np0005543227 certmonger[38965]: 2025-12-03 08:03:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080319 Dec 3 08:03:22 np0005543227 python3[41598]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q lvm2 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:03:22 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:23 np0005543227 python3[41615]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:03:31 np0005543227 podman[41616]: 2025-12-03 08:03:23.231413138 +0000 UTC m=+0.029685492 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Dec 3 08:03:31 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:31 np0005543227 python3[41693]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 cluster.common.tag/manila-share:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:03:31 np0005543227 podman[41694]: 2025-12-03 08:03:31.551796851 +0000 UTC m=+0.044569630 image tag b9682dee21d7c5836da0f5094cc87a67e8c855fb08692e50824e31ad6f3d7b7f cluster.common.tag/manila-share:pcmklatest Dec 3 08:03:31 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:32 np0005543227 python3[41721]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:03:32 np0005543227 python3[41741]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:35 np0005543227 python3[41758]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:38 np0005543227 python3[41775]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:39 np0005543227 python3[41791]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:39 np0005543227 python3[41807]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:03:40 np0005543227 python3[41825]: ansible-certificate_request Invoked with name=memcached dns=['np0005543227.internalapi.ooo.test'] principal=['memcached/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep memcached)#012service_crt="/etc/pki/tls/certs/memcached.crt"#012service_key="/etc/pki/tls/private/memcached.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec -u root "$container_name" chown memcached:memcached "$service_crt"#012podman exec -u root "$container_name" chown memcached:memcached "$service_key"#012# Send refresh_certs command to memcached to read the new certificate#012memcached_ip="$(hiera -c /etc/puppet/hiera.yaml memcached::listen_ip.0 127.0.0.1)"#012memcached_port="$(hiera -c /etc/puppet/hiera.yaml memcached::tcp_port 11211)"#012echo refresh_certs | openssl s_client -connect $memcached_ip:$memcached_port#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:40 np0005543227 certmonger[38965]: 2025-12-03 08:03:40 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:40 np0005543227 certmonger[38965]: 2025-12-03 08:03:40 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:40 np0005543227 certmonger[38965]: 2025-12-03 08:03:40 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:40 np0005543227 certmonger[38965]: 2025-12-03 08:03:40 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:40 np0005543227 certmonger[38965]: 2025-12-03 08:03:40 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:40 np0005543227 certmonger[38965]: 2025-12-03 08:03:40 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:40 np0005543227 certmonger[38965]: 2025-12-03 08:03:40 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:40 np0005543227 certmonger[38965]: 2025-12-03 08:03:40 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:40 np0005543227 certmonger[38965]: 2025-12-03 08:03:40 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:03:41 np0005543227 certmonger[41835]: " for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_REQ_PRINCIPAL" to "memcached/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:03:41 np0005543227 certmonger[41835]: " for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:41 np0005543227 certmonger[41835]: MIID3DCCAsQCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:03:41 np0005543227 certmonger[41835]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxvwc7kg/ Dec 3 08:03:41 np0005543227 certmonger[41835]: rvChd2dyXEpT8ZQL06QSrYCPUMg34JOyg9nA+gg+KD8vW16a97/+zu735WjClQgv Dec 3 08:03:41 np0005543227 certmonger[41835]: VpqKj1p+FhLfECNlLHsI8MtYCpgu/NM5lu6DrdtiNRMRcA2Xa9cbM/Ph4TiFwqiK Dec 3 08:03:41 np0005543227 certmonger[41835]: 891u/cy81qIPz2+6MvAiY86R3F0UPkFks3Wv9Y3bpw83hrd976Xi8AWwUYFxiEuW Dec 3 08:03:41 np0005543227 certmonger[41835]: j4hmGMlh2emZ+ZK+ufiPephn6gqLu+/2oMbCBnESgVorVpUa+DXbfu5tMah0Zrxv Dec 3 08:03:41 np0005543227 certmonger[41835]: bAgz1cV14+YANIv4irTELoK5QCSsKpbWBecxI1TvTvmQ4ofHBQv0/e9tmxoq/17s Dec 3 08:03:41 np0005543227 certmonger[41835]: wbEgHvMHLwn2+wIDAQABoIIBaTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:03:41 np0005543227 certmonger[41835]: ADAAMwAwADgAMAAzADQAMDCCATgGCSqGSIb3DQEJDjGCASkwggElMAsGA1UdDwQE Dec 3 08:03:41 np0005543227 certmonger[41835]: AwIFoDCByQYDVR0RBIHBMIG+giFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:03:41 np0005543227 certmonger[41835]: LnRlc3SgRAYKKwYBBAGCNxQCA6A2DDRtZW1jYWNoZWQvbnAwMDA1NTQzMjI3Lmlu Dec 3 08:03:41 np0005543227 certmonger[41835]: dGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFMGBisGAQUCAqBJMEegChsIT09P Dec 3 08:03:41 np0005543227 certmonger[41835]: LlRFU1ShOTA3oAMCAQGhMDAuGwltZW1jYWNoZWQbIW5wMDAwNTU0MzIyNy5pbnRl Dec 3 08:03:41 np0005543227 certmonger[41835]: cm5hbGFwaS5vb28udGVzdDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:41 np0005543227 certmonger[41835]: DAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUEZioXeQtQyLsG4hmC+qbjoM6IbQwDQYJ Dec 3 08:03:41 np0005543227 certmonger[41835]: KoZIhvcNAQELBQADggEBAKFY9ecc3yCIYQEaygeeg+h8XgQPRtQXHA1izX39vdat Dec 3 08:03:41 np0005543227 certmonger[41835]: UxwrX5rTrt8KINq0/dzpbGE7j+20jjHC4rd6Qk1BJZfbtT4Ovhrx2riL/e39Haru Dec 3 08:03:41 np0005543227 certmonger[41835]: NPAaW2GqD/er07s0YnKeLXMc9L0L9gHK3yZU2mqGL7++L2/ijR3lTFnHiYcHSkFm Dec 3 08:03:41 np0005543227 certmonger[41835]: HAXVysriMFdQrnf16QT3HsoG1fuKeDFOSpjON5P88QWH2pkmd5JfNXsPow1q4U+C Dec 3 08:03:41 np0005543227 certmonger[41835]: PmYStDca0iqc9gB1Vb76yy5YTw2NJDBPLEAAgU2POA2U9D6NromsHpeot8xGJ0NO Dec 3 08:03:41 np0005543227 certmonger[41835]: ftxAvh7vPhyEBqJqyWf2X0kcmPc22va+Mdey8k4jpj8= Dec 3 08:03:41 np0005543227 certmonger[41835]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:41 np0005543227 certmonger[41835]: " for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxvwc7kg/rvChd2dyXEpT8ZQL06QSrYCPUMg34JOyg9nA+gg+KD8vW16a97/+zu735WjClQgvVpqKj1p+FhLfECNlLHsI8MtYCpgu/NM5lu6DrdtiNRMRcA2Xa9cbM/Ph4TiFwqiK891u/cy81qIPz2+6MvAiY86R3F0UPkFks3Wv9Y3bpw83hrd976Xi8AWwUYFxiEuWj4hmGMlh2emZ+ZK+ufiPephn6gqLu+/2oMbCBnESgVorVpUa+DXbfu5tMah0ZrxvbAgz1cV14+YANIv4irTELoK5QCSsKpbWBecxI1TvTvmQ4ofHBQv0/e9tmxoq/17swbEgHvMHLwn2+wIDAQAB" for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:41 np0005543227 certmonger[41835]: 2025-12-03 08:03:41 [41835] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[41835]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:41 np0005543227 certmonger[41835]: Certificate: "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" Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Certificate submission still ongoing. Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Certificate submission attempt complete. Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Child status = 0. Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Child output: Dec 3 08:03:41 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:41 np0005543227 certmonger[38965]: MIIFXzCCA8egAwIBAgIBMjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:41 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:41 np0005543227 certmonger[38965]: MDM0MVoXDTI3MTIwNDA4MDM0MVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:41 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:41 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAMb8HO5IP67woXdnclxKU/GUC9OkEq2Aj1DI Dec 3 08:03:41 np0005543227 certmonger[38965]: N+CTsoPZwPoIPig/L1temve//s7u9+VowpUIL1aaio9afhYS3xAjZSx7CPDLWAqY Dec 3 08:03:41 np0005543227 certmonger[38965]: LvzTOZbug63bYjUTEXANl2vXGzPz4eE4hcKoivPdbv3MvNaiD89vujLwImPOkdxd Dec 3 08:03:41 np0005543227 certmonger[38965]: FD5BZLN1r/WN26cPN4a3fe+l4vAFsFGBcYhLlo+IZhjJYdnpmfmSvrn4j3qYZ+oK Dec 3 08:03:41 np0005543227 certmonger[38965]: i7vv9qDGwgZxEoFaK1aVGvg1237ubTGodGa8b2wIM9XFdePmADSL+Iq0xC6CuUAk Dec 3 08:03:41 np0005543227 certmonger[38965]: rCqW1gXnMSNU7075kOKHxwUL9P3vbZsaKv9e7MGxIB7zBy8J9vsCAwEAAaOCAfAw Dec 3 08:03:41 np0005543227 certmonger[38965]: ggHsMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:41 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:41 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:41 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:41 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:41 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOWqLoX6Rzk1UYNbcdOVueJ2 Dec 3 08:03:41 np0005543227 certmonger[38965]: AqD6MIHJBgNVHREEgcEwgb6CIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:41 np0005543227 certmonger[38965]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU1NDMyMjcuaW50 Dec 3 08:03:41 np0005543227 certmonger[38965]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Dec 3 08:03:41 np0005543227 certmonger[38965]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NTQzMjI3LmludGVy Dec 3 08:03:41 np0005543227 certmonger[38965]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBv1UaO7qnKuyHfbmzh Dec 3 08:03:41 np0005543227 certmonger[38965]: IrtBrf6jznit0mCkR6YhKM72db6DVrEqa4x4JF76aXrPCXj1Fe1gdqwmx4KpFrTg Dec 3 08:03:41 np0005543227 certmonger[38965]: CIixPKKulCQE8fIoB7iXMJDnQVRztAqVBLpYeFLP8u+rCcZOIg0dH15QYKfTg/Ep Dec 3 08:03:41 np0005543227 certmonger[38965]: YVmJXBvJH6pTnJfJMRTtLMd5nGwtEdaAjvWo7gCYQVZTOfdJy0kBhKqQrL1rUeaV Dec 3 08:03:41 np0005543227 certmonger[38965]: L/smYofp/7b/CvQImAkL2DS8HdnodlkYwknXQFgEU2jaEDQEEAQ/69HktPztUMBA Dec 3 08:03:41 np0005543227 certmonger[38965]: FQkBTTJu+xzrhnUHp0lFrXmxIzjQfemUJHo+GCDfQ5c1wwmR1omxiZSoaF5yQ0Ax Dec 3 08:03:41 np0005543227 certmonger[38965]: 6MJEZo04ODafJ0o9fN/w41QE1pMMwDcBSAIZ7mH0DuRCuXwuH1hCzdXa1+O5oDHz Dec 3 08:03:41 np0005543227 certmonger[38965]: Wjiq6xokNQdLR5vagxONtnEx+apuXv8dImJCUTT7GMAtYEDRkbkUYloSP9edxyLi Dec 3 08:03:41 np0005543227 certmonger[38965]: 4o4Q62dwAJlRB//tGLWfK7EelO3O+CO2ywLXqzdc1BYmOWM= Dec 3 08:03:41 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:41 np0005543227 certmonger[38965]: " Dec 3 08:03:41 np0005543227 certmonger[41837]: 2025-12-03 08:03:41 [41837] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:41 np0005543227 certmonger[41837]: MIIFXzCCA8egAwIBAgIBMjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:41 np0005543227 certmonger[41837]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:41 np0005543227 certmonger[41837]: MDM0MVoXDTI3MTIwNDA4MDM0MVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:41 np0005543227 certmonger[41837]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:41 np0005543227 certmonger[41837]: hvcNAQEBBQADggEPADCCAQoCggEBAMb8HO5IP67woXdnclxKU/GUC9OkEq2Aj1DI Dec 3 08:03:41 np0005543227 certmonger[41837]: N+CTsoPZwPoIPig/L1temve//s7u9+VowpUIL1aaio9afhYS3xAjZSx7CPDLWAqY Dec 3 08:03:41 np0005543227 certmonger[41837]: LvzTOZbug63bYjUTEXANl2vXGzPz4eE4hcKoivPdbv3MvNaiD89vujLwImPOkdxd Dec 3 08:03:41 np0005543227 certmonger[41837]: FD5BZLN1r/WN26cPN4a3fe+l4vAFsFGBcYhLlo+IZhjJYdnpmfmSvrn4j3qYZ+oK Dec 3 08:03:41 np0005543227 certmonger[41837]: i7vv9qDGwgZxEoFaK1aVGvg1237ubTGodGa8b2wIM9XFdePmADSL+Iq0xC6CuUAk Dec 3 08:03:41 np0005543227 certmonger[41837]: rCqW1gXnMSNU7075kOKHxwUL9P3vbZsaKv9e7MGxIB7zBy8J9vsCAwEAAaOCAfAw Dec 3 08:03:41 np0005543227 certmonger[41837]: ggHsMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:41 np0005543227 certmonger[41837]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:41 np0005543227 certmonger[41837]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:41 np0005543227 certmonger[41837]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:41 np0005543227 certmonger[41837]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:41 np0005543227 certmonger[41837]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOWqLoX6Rzk1UYNbcdOVueJ2 Dec 3 08:03:41 np0005543227 certmonger[41837]: AqD6MIHJBgNVHREEgcEwgb6CIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:41 np0005543227 certmonger[41837]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU1NDMyMjcuaW50 Dec 3 08:03:41 np0005543227 certmonger[41837]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Dec 3 08:03:41 np0005543227 certmonger[41837]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NTQzMjI3LmludGVy Dec 3 08:03:41 np0005543227 certmonger[41837]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBv1UaO7qnKuyHfbmzh Dec 3 08:03:41 np0005543227 certmonger[41837]: IrtBrf6jznit0mCkR6YhKM72db6DVrEqa4x4JF76aXrPCXj1Fe1gdqwmx4KpFrTg Dec 3 08:03:41 np0005543227 certmonger[41837]: CIixPKKulCQE8fIoB7iXMJDnQVRztAqVBLpYeFLP8u+rCcZOIg0dH15QYKfTg/Ep Dec 3 08:03:41 np0005543227 certmonger[41837]: YVmJXBvJH6pTnJfJMRTtLMd5nGwtEdaAjvWo7gCYQVZTOfdJy0kBhKqQrL1rUeaV Dec 3 08:03:41 np0005543227 certmonger[41837]: L/smYofp/7b/CvQImAkL2DS8HdnodlkYwknXQFgEU2jaEDQEEAQ/69HktPztUMBA Dec 3 08:03:41 np0005543227 certmonger[41837]: FQkBTTJu+xzrhnUHp0lFrXmxIzjQfemUJHo+GCDfQ5c1wwmR1omxiZSoaF5yQ0Ax Dec 3 08:03:41 np0005543227 certmonger[41837]: 6MJEZo04ODafJ0o9fN/w41QE1pMMwDcBSAIZ7mH0DuRCuXwuH1hCzdXa1+O5oDHz Dec 3 08:03:41 np0005543227 certmonger[41837]: Wjiq6xokNQdLR5vagxONtnEx+apuXv8dImJCUTT7GMAtYEDRkbkUYloSP9edxyLi Dec 3 08:03:41 np0005543227 certmonger[41837]: 4o4Q62dwAJlRB//tGLWfK7EelO3O+CO2ywLXqzdc1BYmOWM= Dec 3 08:03:41 np0005543227 certmonger[41837]: -----END CERTIFICATE----- Dec 3 08:03:41 np0005543227 certmonger[41837]: ". Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Certificate submission still ongoing. Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Certificate submission postprocessing complete. Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Child status = 0. Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Child output: Dec 3 08:03:41 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n4o4Q62dwAJlRB//tGLWfK7EelO3O+CO2ywLXqzdc1BYmOWM=\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:41 np0005543227 certmonger[38965]: " Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:41 np0005543227 certmonger[38965]: MIIFXzCCA8egAwIBAgIBMjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:41 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:41 np0005543227 certmonger[38965]: MDM0MVoXDTI3MTIwNDA4MDM0MVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:41 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:41 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAMb8HO5IP67woXdnclxKU/GUC9OkEq2Aj1DI Dec 3 08:03:41 np0005543227 certmonger[38965]: N+CTsoPZwPoIPig/L1temve//s7u9+VowpUIL1aaio9afhYS3xAjZSx7CPDLWAqY Dec 3 08:03:41 np0005543227 certmonger[38965]: LvzTOZbug63bYjUTEXANl2vXGzPz4eE4hcKoivPdbv3MvNaiD89vujLwImPOkdxd Dec 3 08:03:41 np0005543227 certmonger[38965]: FD5BZLN1r/WN26cPN4a3fe+l4vAFsFGBcYhLlo+IZhjJYdnpmfmSvrn4j3qYZ+oK Dec 3 08:03:41 np0005543227 certmonger[38965]: i7vv9qDGwgZxEoFaK1aVGvg1237ubTGodGa8b2wIM9XFdePmADSL+Iq0xC6CuUAk Dec 3 08:03:41 np0005543227 certmonger[38965]: rCqW1gXnMSNU7075kOKHxwUL9P3vbZsaKv9e7MGxIB7zBy8J9vsCAwEAAaOCAfAw Dec 3 08:03:41 np0005543227 certmonger[38965]: ggHsMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:41 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:41 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:41 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:41 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:41 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOWqLoX6Rzk1UYNbcdOVueJ2 Dec 3 08:03:41 np0005543227 certmonger[38965]: AqD6MIHJBgNVHREEgcEwgb6CIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:41 np0005543227 certmonger[38965]: dGVzdKBEBgorBgEEAYI3FAIDoDYMNG1lbWNhY2hlZC9ucDAwMDU1NDMyMjcuaW50 Dec 3 08:03:41 np0005543227 certmonger[38965]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUwYGKwYBBQICoEkwR6AKGwhPT08u Dec 3 08:03:41 np0005543227 certmonger[38965]: VEVTVKE5MDegAwIBAaEwMC4bCW1lbWNhY2hlZBshbnAwMDA1NTQzMjI3LmludGVy Dec 3 08:03:41 np0005543227 certmonger[38965]: bmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQBv1UaO7qnKuyHfbmzh Dec 3 08:03:41 np0005543227 certmonger[38965]: IrtBrf6jznit0mCkR6YhKM72db6DVrEqa4x4JF76aXrPCXj1Fe1gdqwmx4KpFrTg Dec 3 08:03:41 np0005543227 certmonger[38965]: CIixPKKulCQE8fIoB7iXMJDnQVRztAqVBLpYeFLP8u+rCcZOIg0dH15QYKfTg/Ep Dec 3 08:03:41 np0005543227 certmonger[38965]: YVmJXBvJH6pTnJfJMRTtLMd5nGwtEdaAjvWo7gCYQVZTOfdJy0kBhKqQrL1rUeaV Dec 3 08:03:41 np0005543227 certmonger[38965]: L/smYofp/7b/CvQImAkL2DS8HdnodlkYwknXQFgEU2jaEDQEEAQ/69HktPztUMBA Dec 3 08:03:41 np0005543227 certmonger[38965]: FQkBTTJu+xzrhnUHp0lFrXmxIzjQfemUJHo+GCDfQ5c1wwmR1omxiZSoaF5yQ0Ax Dec 3 08:03:41 np0005543227 certmonger[38965]: 6MJEZo04ODafJ0o9fN/w41QE1pMMwDcBSAIZ7mH0DuRCuXwuH1hCzdXa1+O5oDHz Dec 3 08:03:41 np0005543227 certmonger[38965]: Wjiq6xokNQdLR5vagxONtnEx+apuXv8dImJCUTT7GMAtYEDRkbkUYloSP9edxyLi Dec 3 08:03:41 np0005543227 certmonger[38965]: 4o4Q62dwAJlRB//tGLWfK7EelO3O+CO2ywLXqzdc1BYmOWM= Dec 3 08:03:41 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:41 np0005543227 certmonger[38965]: ". Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] No hooks set for pre-save command. Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 certmonger[38965]: 2025-12-03 08:03:41 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:41 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:41 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:42 np0005543227 certmonger[38965]: 2025-12-03 08:03:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:42 np0005543227 certmonger[38965]: 2025-12-03 08:03:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:42 np0005543227 certmonger[41907]: Certificate in file "/etc/pki/tls/certs/memcached.crt" issued by CA and saved. Dec 3 08:03:42 np0005543227 certmonger[38965]: 2025-12-03 08:03:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080340 Dec 3 08:03:42 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:43 np0005543227 python3[41923]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:03:43 np0005543227 python3[41943]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:46 np0005543227 python3[41960]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:49 np0005543227 python3[41977]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:49 np0005543227 python3[41993]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:03:50 np0005543227 python3[42009]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:03:51 np0005543227 python3[42027]: ansible-certificate_request Invoked with name=metrics_qdr dns=['np0005543227.internalapi.ooo.test'] principal=['metrics_qdr/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep metrics_qdr)#012service_crt="/etc/pki/tls/certs/metrics_qdr.crt"#012service_key="/etc/pki/tls/private/metrics_qdr.key#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_crt"#012podman exec "$container_name" chown qdrouterd:qdrouterd "$service_key"#012# Trigger a container restart to read the new certificate#012podman restart "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:03:51 np0005543227 certmonger[42037]: " for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_REQ_PRINCIPAL" to "metrics_qdr/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:03:51 np0005543227 certmonger[42037]: " for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:03:51 np0005543227 certmonger[42037]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:03:51 np0005543227 certmonger[42037]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1zjzu5s0 Dec 3 08:03:51 np0005543227 certmonger[42037]: rXwU771MHmlsLy1KWuwBo9ZOlTRQWFq7Yqymf+gxhqfq1Bv9wvnyd4Kjnwh96L9U Dec 3 08:03:51 np0005543227 certmonger[42037]: bQdzym4GWSQxplhApMXixQgzrB71dliCenVDb2Hjw7z5+Orrk8ukdKKKTacK70tm Dec 3 08:03:51 np0005543227 certmonger[42037]: HM73AV7HReVxTVMIjFKiAPm5ndxHvLXuPaJfqkwH116ZIkvRr8oJU5pQhx4mM0Wt Dec 3 08:03:51 np0005543227 certmonger[42037]: yiHnVoSdrx7KrWSJhWXCBR3UXxLLZ+QDoRZTI3ZWEAmqBkfH37yHb6a2Ed0dvsqe Dec 3 08:03:51 np0005543227 certmonger[42037]: Wnr4wU6BXPFySqD55BMXLbnJbWWkIcmt6/TBTMwn/3g1Ka31LKDd5uWFHr4+b8qS Dec 3 08:03:51 np0005543227 certmonger[42037]: iWCprJ2nd9KeiwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:03:51 np0005543227 certmonger[42037]: ADAAMwAwADgAMAAzADUAMTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Dec 3 08:03:51 np0005543227 certmonger[42037]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:03:51 np0005543227 certmonger[42037]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZtZXRyaWNzX3Fkci9ucDAwMDU1NDMyMjcu Dec 3 08:03:51 np0005543227 certmonger[42037]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Dec 3 08:03:51 np0005543227 certmonger[42037]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC21ldHJpY3NfcWRyGyFucDAwMDU1NDMyMjcu Dec 3 08:03:51 np0005543227 certmonger[42037]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Dec 3 08:03:51 np0005543227 certmonger[42037]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFBGYqF3kLUMi7BuIZgvqm46DOiG0 Dec 3 08:03:51 np0005543227 certmonger[42037]: MA0GCSqGSIb3DQEBCwUAA4IBAQBJUSesCDiXBntggEpvYzSdgsS7E5VersK7uCrm Dec 3 08:03:51 np0005543227 certmonger[42037]: uihCUv2kPi7Ncbtgs12+4nDJ/tBTccWdD6NG6QLLOJexGSAp10IQTtq+xqrdY+/r Dec 3 08:03:51 np0005543227 certmonger[42037]: fqUjCMCR/3+sjxHJhOZiJh4C7+ShwgaJxzoxIS/hB7us1tlLOSI4s4eiOfGpBb27 Dec 3 08:03:51 np0005543227 certmonger[42037]: 2KzJ5XlvozsNX+N6fpu1ltDtJF48aQnpihtI0PWLG+sQa1Bv+z+CrDKfUt/pdHk0 Dec 3 08:03:51 np0005543227 certmonger[42037]: 1PVtON93xWh43DvdAyd74pfI8/a+aqC3a7Prc/SGfhTqNlPWVQ4tFjvAq69tyCZA Dec 3 08:03:51 np0005543227 certmonger[42037]: 7viiGHM8geKSsTcWHWK6w/C6EysoFbERk+nTkjS8vc/25y2v Dec 3 08:03:51 np0005543227 certmonger[42037]: -----END CERTIFICATE REQUEST----- Dec 3 08:03:51 np0005543227 certmonger[42037]: " for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1zjzu5s0rXwU771MHmlsLy1KWuwBo9ZOlTRQWFq7Yqymf+gxhqfq1Bv9wvnyd4Kjnwh96L9UbQdzym4GWSQxplhApMXixQgzrB71dliCenVDb2Hjw7z5+Orrk8ukdKKKTacK70tmHM73AV7HReVxTVMIjFKiAPm5ndxHvLXuPaJfqkwH116ZIkvRr8oJU5pQhx4mM0WtyiHnVoSdrx7KrWSJhWXCBR3UXxLLZ+QDoRZTI3ZWEAmqBkfH37yHb6a2Ed0dvsqeWnr4wU6BXPFySqD55BMXLbnJbWWkIcmt6/TBTMwn/3g1Ka31LKDd5uWFHr4+b8qSiWCprJ2nd9KeiwIDAQAB" for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:51 np0005543227 certmonger[42037]: 2025-12-03 08:03:51 [42037] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:03:51 np0005543227 certmonger[38965]: 2025-12-03 08:03:51 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:51 np0005543227 certmonger[42037]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:03:52 np0005543227 certmonger[42037]: Certificate: "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" Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Certificate submission still ongoing. Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Certificate submission attempt complete. Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Child status = 0. Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Child output: Dec 3 08:03:52 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:03:52 np0005543227 certmonger[38965]: MIIFYzCCA8ugAwIBAgIBNDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:52 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:52 np0005543227 certmonger[38965]: MDM1MloXDTI3MTIwNDA4MDM1MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:52 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:52 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBANc487ubNK18FO+9TB5pbC8tSlrsAaPWTpU0 Dec 3 08:03:52 np0005543227 certmonger[38965]: UFhau2Kspn/oMYan6tQb/cL58neCo58Ifei/VG0Hc8puBlkkMaZYQKTF4sUIM6we Dec 3 08:03:52 np0005543227 certmonger[38965]: 9XZYgnp1Q29h48O8+fjq65PLpHSiik2nCu9LZhzO9wFex0XlcU1TCIxSogD5uZ3c Dec 3 08:03:52 np0005543227 certmonger[38965]: R7y17j2iX6pMB9demSJL0a/KCVOaUIceJjNFrcoh51aEna8eyq1kiYVlwgUd1F8S Dec 3 08:03:52 np0005543227 certmonger[38965]: y2fkA6EWUyN2VhAJqgZHx9+8h2+mthHdHb7Knlp6+MFOgVzxckqg+eQTFy25yW1l Dec 3 08:03:52 np0005543227 certmonger[38965]: pCHJrev0wUzMJ/94NSmt9Syg3eblhR6+Pm/Kkolgqaydp3fSnosCAwEAAaOCAfQw Dec 3 08:03:52 np0005543227 certmonger[38965]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:52 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:52 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:52 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:52 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:52 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJQmEPd/UjE0F1XFYx6FokOX Dec 3 08:03:52 np0005543227 certmonger[38965]: tWkaMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:52 np0005543227 certmonger[38965]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTU0MzIyNy5p Dec 3 08:03:52 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:03:52 np0005543227 certmonger[38965]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTU0MzIyNy5p Dec 3 08:03:52 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEASR7ktrq9pIYF Dec 3 08:03:52 np0005543227 certmonger[38965]: 2pB04CiGGfK3OFzwjd1Sj8ck1nv0lgbYxDoIPhlhfA5dHo/JNeASeLsvHkKOU+r6 Dec 3 08:03:52 np0005543227 certmonger[38965]: 48UDUXrdymrs3hsWk5n553XUexGiNSgT6VO9iv1TzJljNhiFI+l7b+tztQiy/kUg Dec 3 08:03:52 np0005543227 certmonger[38965]: zDV785d2MVFRytxgdtOhY1lR85SG5HoS9wNxwk2yHQSY+CTGfIZyyC7k2hlb3QRr Dec 3 08:03:52 np0005543227 certmonger[38965]: xbd7sJH9iI8v/S5H0EWBmZia929P1W8hEhv5G6smrKpxvn3h03efwNMlBF4ZDwxQ Dec 3 08:03:52 np0005543227 certmonger[38965]: eBDLfmMSFz3v2gGtUsjOhTvnay8DZG+zPhgkAMQhaWDYeSEXJKEfPn1+QIBbNExB Dec 3 08:03:52 np0005543227 certmonger[38965]: modtrhipgEHN+PVeBGdXHqNFJPhfxBwa1BShghKhbHRnetewPE1fVd6CPp3xdeWL Dec 3 08:03:52 np0005543227 certmonger[38965]: +4t+oaYLvTmYHaW5DYKEncG1Csho68Pgdl5hD5FZIb2klgdFYwmS0r8iVH52bwes Dec 3 08:03:52 np0005543227 certmonger[38965]: 4RdIcVxpRN90xpd3q9TBRB+M0nKwWwMjPW8TIi9X2aN50XHqlKBa Dec 3 08:03:52 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:52 np0005543227 certmonger[38965]: " Dec 3 08:03:52 np0005543227 certmonger[42039]: 2025-12-03 08:03:52 [42039] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:03:52 np0005543227 certmonger[42039]: MIIFYzCCA8ugAwIBAgIBNDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:52 np0005543227 certmonger[42039]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:52 np0005543227 certmonger[42039]: MDM1MloXDTI3MTIwNDA4MDM1MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:52 np0005543227 certmonger[42039]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:52 np0005543227 certmonger[42039]: hvcNAQEBBQADggEPADCCAQoCggEBANc487ubNK18FO+9TB5pbC8tSlrsAaPWTpU0 Dec 3 08:03:52 np0005543227 certmonger[42039]: UFhau2Kspn/oMYan6tQb/cL58neCo58Ifei/VG0Hc8puBlkkMaZYQKTF4sUIM6we Dec 3 08:03:52 np0005543227 certmonger[42039]: 9XZYgnp1Q29h48O8+fjq65PLpHSiik2nCu9LZhzO9wFex0XlcU1TCIxSogD5uZ3c Dec 3 08:03:52 np0005543227 certmonger[42039]: R7y17j2iX6pMB9demSJL0a/KCVOaUIceJjNFrcoh51aEna8eyq1kiYVlwgUd1F8S Dec 3 08:03:52 np0005543227 certmonger[42039]: y2fkA6EWUyN2VhAJqgZHx9+8h2+mthHdHb7Knlp6+MFOgVzxckqg+eQTFy25yW1l Dec 3 08:03:52 np0005543227 certmonger[42039]: pCHJrev0wUzMJ/94NSmt9Syg3eblhR6+Pm/Kkolgqaydp3fSnosCAwEAAaOCAfQw Dec 3 08:03:52 np0005543227 certmonger[42039]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:52 np0005543227 certmonger[42039]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:52 np0005543227 certmonger[42039]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:52 np0005543227 certmonger[42039]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:52 np0005543227 certmonger[42039]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:52 np0005543227 certmonger[42039]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJQmEPd/UjE0F1XFYx6FokOX Dec 3 08:03:52 np0005543227 certmonger[42039]: tWkaMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:52 np0005543227 certmonger[42039]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTU0MzIyNy5p Dec 3 08:03:52 np0005543227 certmonger[42039]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:03:52 np0005543227 certmonger[42039]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTU0MzIyNy5p Dec 3 08:03:52 np0005543227 certmonger[42039]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEASR7ktrq9pIYF Dec 3 08:03:52 np0005543227 certmonger[42039]: 2pB04CiGGfK3OFzwjd1Sj8ck1nv0lgbYxDoIPhlhfA5dHo/JNeASeLsvHkKOU+r6 Dec 3 08:03:52 np0005543227 certmonger[42039]: 48UDUXrdymrs3hsWk5n553XUexGiNSgT6VO9iv1TzJljNhiFI+l7b+tztQiy/kUg Dec 3 08:03:52 np0005543227 certmonger[42039]: zDV785d2MVFRytxgdtOhY1lR85SG5HoS9wNxwk2yHQSY+CTGfIZyyC7k2hlb3QRr Dec 3 08:03:52 np0005543227 certmonger[42039]: xbd7sJH9iI8v/S5H0EWBmZia929P1W8hEhv5G6smrKpxvn3h03efwNMlBF4ZDwxQ Dec 3 08:03:52 np0005543227 certmonger[42039]: eBDLfmMSFz3v2gGtUsjOhTvnay8DZG+zPhgkAMQhaWDYeSEXJKEfPn1+QIBbNExB Dec 3 08:03:52 np0005543227 certmonger[42039]: modtrhipgEHN+PVeBGdXHqNFJPhfxBwa1BShghKhbHRnetewPE1fVd6CPp3xdeWL Dec 3 08:03:52 np0005543227 certmonger[42039]: +4t+oaYLvTmYHaW5DYKEncG1Csho68Pgdl5hD5FZIb2klgdFYwmS0r8iVH52bwes Dec 3 08:03:52 np0005543227 certmonger[42039]: 4RdIcVxpRN90xpd3q9TBRB+M0nKwWwMjPW8TIi9X2aN50XHqlKBa Dec 3 08:03:52 np0005543227 certmonger[42039]: -----END CERTIFICATE----- Dec 3 08:03:52 np0005543227 certmonger[42039]: ". Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Certificate submission still ongoing. Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Certificate submission postprocessing complete. Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Child status = 0. Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Child output: Dec 3 08:03:52 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\n4RdIcVxpRN90xpd3q9TBRB+M0nKwWwMjPW8TIi9X2aN50XHqlKBa\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:03:52 np0005543227 certmonger[38965]: " Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:03:52 np0005543227 certmonger[38965]: MIIFYzCCA8ugAwIBAgIBNDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:03:52 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:03:52 np0005543227 certmonger[38965]: MDM1MloXDTI3MTIwNDA4MDM1MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:03:52 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:03:52 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBANc487ubNK18FO+9TB5pbC8tSlrsAaPWTpU0 Dec 3 08:03:52 np0005543227 certmonger[38965]: UFhau2Kspn/oMYan6tQb/cL58neCo58Ifei/VG0Hc8puBlkkMaZYQKTF4sUIM6we Dec 3 08:03:52 np0005543227 certmonger[38965]: 9XZYgnp1Q29h48O8+fjq65PLpHSiik2nCu9LZhzO9wFex0XlcU1TCIxSogD5uZ3c Dec 3 08:03:52 np0005543227 certmonger[38965]: R7y17j2iX6pMB9demSJL0a/KCVOaUIceJjNFrcoh51aEna8eyq1kiYVlwgUd1F8S Dec 3 08:03:52 np0005543227 certmonger[38965]: y2fkA6EWUyN2VhAJqgZHx9+8h2+mthHdHb7Knlp6+MFOgVzxckqg+eQTFy25yW1l Dec 3 08:03:52 np0005543227 certmonger[38965]: pCHJrev0wUzMJ/94NSmt9Syg3eblhR6+Pm/Kkolgqaydp3fSnosCAwEAAaOCAfQw Dec 3 08:03:52 np0005543227 certmonger[38965]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:03:52 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:03:52 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:03:52 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:03:52 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:03:52 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJQmEPd/UjE0F1XFYx6FokOX Dec 3 08:03:52 np0005543227 certmonger[38965]: tWkaMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:03:52 np0005543227 certmonger[38965]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm1ldHJpY3NfcWRyL25wMDAwNTU0MzIyNy5p Dec 3 08:03:52 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:03:52 np0005543227 certmonger[38965]: Ty5URVNUoTswOaADAgEBoTIwMBsLbWV0cmljc19xZHIbIW5wMDAwNTU0MzIyNy5p Dec 3 08:03:52 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEASR7ktrq9pIYF Dec 3 08:03:52 np0005543227 certmonger[38965]: 2pB04CiGGfK3OFzwjd1Sj8ck1nv0lgbYxDoIPhlhfA5dHo/JNeASeLsvHkKOU+r6 Dec 3 08:03:52 np0005543227 certmonger[38965]: 48UDUXrdymrs3hsWk5n553XUexGiNSgT6VO9iv1TzJljNhiFI+l7b+tztQiy/kUg Dec 3 08:03:52 np0005543227 certmonger[38965]: zDV785d2MVFRytxgdtOhY1lR85SG5HoS9wNxwk2yHQSY+CTGfIZyyC7k2hlb3QRr Dec 3 08:03:52 np0005543227 certmonger[38965]: xbd7sJH9iI8v/S5H0EWBmZia929P1W8hEhv5G6smrKpxvn3h03efwNMlBF4ZDwxQ Dec 3 08:03:52 np0005543227 certmonger[38965]: eBDLfmMSFz3v2gGtUsjOhTvnay8DZG+zPhgkAMQhaWDYeSEXJKEfPn1+QIBbNExB Dec 3 08:03:52 np0005543227 certmonger[38965]: modtrhipgEHN+PVeBGdXHqNFJPhfxBwa1BShghKhbHRnetewPE1fVd6CPp3xdeWL Dec 3 08:03:52 np0005543227 certmonger[38965]: +4t+oaYLvTmYHaW5DYKEncG1Csho68Pgdl5hD5FZIb2klgdFYwmS0r8iVH52bwes Dec 3 08:03:52 np0005543227 certmonger[38965]: 4RdIcVxpRN90xpd3q9TBRB+M0nKwWwMjPW8TIi9X2aN50XHqlKBa Dec 3 08:03:52 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:03:52 np0005543227 certmonger[38965]: ". Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] No hooks set for pre-save command. Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:52 np0005543227 certmonger[42058]: Certificate in file "/etc/pki/tls/certs/metrics_qdr.crt" issued by CA and saved. Dec 3 08:03:52 np0005543227 certmonger[38965]: 2025-12-03 08:03:52 [38965] Wrote to /var/lib/certmonger/requests/20251203080351 Dec 3 08:03:53 np0005543227 python3[42074]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:03:53 np0005543227 python3[42094]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:03:57 np0005543227 python3[42111]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:00 np0005543227 python3[42128]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:01 np0005543227 python3[42144]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:01 np0005543227 python3[42160]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:02 np0005543227 python3[42178]: ansible-certificate_request Invoked with name=mysql dns=['np0005543227.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['mysql/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:04:02 np0005543227 certmonger[42188]: overcloud.internalapi.ooo.test Dec 3 08:04:02 np0005543227 certmonger[42188]: " for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_REQ_PRINCIPAL" to "mysql/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:04:02 np0005543227 certmonger[42188]: " for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:02 np0005543227 certmonger[42188]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:04:02 np0005543227 certmonger[42188]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAu1auoMHn Dec 3 08:04:02 np0005543227 certmonger[42188]: 4AbRWPu9ZqF2+5Zu0aWesPyQ/hirqAHv5MD3a7MoSZpAwG0181RtP3cFwHS+ZX0D Dec 3 08:04:02 np0005543227 certmonger[42188]: yLQkLbvSZqYyu68oOM9oNHc4bFWKTDJVowZCt4i1oCEECBA2lPB3bRIzgZZteoTH Dec 3 08:04:02 np0005543227 certmonger[42188]: 2LgcMn3O46z3dI3OUYuBYHnWBKtquVflHih5g+J5IqyAN28gYEt/9hcxmvNdEEE9 Dec 3 08:04:02 np0005543227 certmonger[42188]: d9ICvWWqIkn56No8iKAn0Py7PqXBd9FjNbz+zMJCB566cuBlo4FJPe6GeC6yxOm5 Dec 3 08:04:02 np0005543227 certmonger[42188]: NJAit9cp3YvZhCaQpTtwY9fLxgbtUND44p25ibc9xeg3VrMP78MECkcJ2gd9BWhx Dec 3 08:04:02 np0005543227 certmonger[42188]: 8aZTW20XwAF74QIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:02 np0005543227 certmonger[42188]: ADAAMwAwADgAMAA0ADAAMjCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Dec 3 08:04:02 np0005543227 certmonger[42188]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:04:02 np0005543227 certmonger[42188]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Dec 3 08:04:02 np0005543227 certmonger[42188]: FAIDoDIMMG15c3FsL25wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdEBP Dec 3 08:04:02 np0005543227 certmonger[42188]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Dec 3 08:04:02 np0005543227 certmonger[42188]: bXlzcWwbIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Dec 3 08:04:02 np0005543227 certmonger[42188]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Dec 3 08:04:02 np0005543227 certmonger[42188]: EZioXeQtQyLsG4hmC+qbjoM6IbQwDQYJKoZIhvcNAQELBQADggEBAJpLkTSp7wJI Dec 3 08:04:02 np0005543227 certmonger[42188]: k6Exg7zZkdt3EO3wAYM5vPLnFiGf3yTaKOqjWleYtJ5IZs7mdEWVgrJg2Nc+P9qs Dec 3 08:04:02 np0005543227 certmonger[42188]: /NjEQo3W6V+NvAKDpHCzkKI7pAeo63YGV2f2Bk32ItP4D47GM3egVdpcXiOJtJ+b Dec 3 08:04:02 np0005543227 certmonger[42188]: 2s7qQptpgZrn7H+/ovf22X+YjKAnm7GSbrtE/LHPeJRcePYo7Bp9jJbw8jcLW7JQ Dec 3 08:04:02 np0005543227 certmonger[42188]: KMje4QKDSZBXf4AFF3mH2dFsAvn9Dz9GwelXHpf/xxNPEalZyAkpI+5pJSSxaZMk Dec 3 08:04:02 np0005543227 certmonger[42188]: x41irDrFclBkrPFM9Pm4IvSdRDo2zaZQQb11smUWs7mqYc4fC/0HAccGqDusKder Dec 3 08:04:02 np0005543227 certmonger[42188]: kawxJzAiN9c= Dec 3 08:04:02 np0005543227 certmonger[42188]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:02 np0005543227 certmonger[42188]: " for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAu1auoMHn4AbRWPu9ZqF2+5Zu0aWesPyQ/hirqAHv5MD3a7MoSZpAwG0181RtP3cFwHS+ZX0DyLQkLbvSZqYyu68oOM9oNHc4bFWKTDJVowZCt4i1oCEECBA2lPB3bRIzgZZteoTH2LgcMn3O46z3dI3OUYuBYHnWBKtquVflHih5g+J5IqyAN28gYEt/9hcxmvNdEEE9d9ICvWWqIkn56No8iKAn0Py7PqXBd9FjNbz+zMJCB566cuBlo4FJPe6GeC6yxOm5NJAit9cp3YvZhCaQpTtwY9fLxgbtUND44p25ibc9xeg3VrMP78MECkcJ2gd9BWhx8aZTW20XwAF74QIDAQAB" for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:02 np0005543227 certmonger[42188]: 2025-12-03 08:04:02 [42188] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:02 np0005543227 certmonger[38965]: 2025-12-03 08:04:02 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:02 np0005543227 certmonger[42188]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:04:03 np0005543227 certmonger[42188]: Certificate: "MIIFdzCCA9+gAwIBAgIBNjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4MDQwM1oXDTI3MTIwNDA4MDQwM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALtWrqDB5+AG0Vj7vWahdvuWbtGlnrD8kP4Yq6gB7+TA92uzKEmaQMBtNfNUbT93BcB0vmV9A8i0JC270mamMruvKDjPaDR3OGxVikwyVaMGQreItaAhBAgQNpTwd20SM4GWbXqEx9i4HDJ9zuOs93SNzlGLgWB51gSrarlX5R4oeYPieSKsgDdvIGBLf/YXMZrzXRBBPXfSAr1lqiJJ+ejaPIigJ9D8uz6lwXfRYzW8/szCQgeeunLgZaOBST3uhngussTpuTSQIrfXKd2L2YQmkKU7cGPXy8YG7VDQ+OKduYm3PcXoN1azD+/DBApHCdoHfQVocfGmU1ttF8ABe+ECAwEAAaOCAggwggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCM1otK3bnB+28DOUD1TOWh2owJ0MIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcUAgOgMgwwbXlzcWwvbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVteXNxbBshbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQAOxv4r6aUs38ucLe4sArbosmW5hpeAfWHPzIaBe2G1SNbsNA1RxIWJG9/NIIUzjjd7etZ9vsv7bM/Pg8ztSZ/YXtvWcWbhr8fORoL3MfAoz3mRWJk8sLNqMShnteBObMrN2z1vZ0+V5dvLwv3ckTMDAqVNg+4pjCdHwCp8qQ4Eitw/ssoWtmPMREPoJbIUnp4RDb8mHbHXaPx4JTzFFdWrkJqRpx3sjXSb8w0PZaDO9TQbIfq6zX3FiyiJyE6IFvDdcO+cIV31PYyavCn0CIhA0rOa7pLsVq0aR5RqGYUjYZB6Je2mCAEq2Kv1kiodNjHgFIWKwWkAFNH6KOBBAGqy5iCnPt4RQxQ2ekPwrKNKehQ3fXWW0ZqN9h0/VIpaL5oNbHes+to5vgSgpIRC0/+j1BvGzTIidnudcimn3218CmwXPojFICJXonOYUJJeLj6TJ9or3+S4oXp4mZ/mvijFc+CMUFPGeUjcqsmAytcvqwZnicTlOLIlXt4fpL/+TSI=" Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Certificate submission still ongoing. Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Certificate submission attempt complete. Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Child status = 0. Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Child output: Dec 3 08:04:03 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:04:03 np0005543227 certmonger[38965]: MIIFdzCCA9+gAwIBAgIBNjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:03 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:03 np0005543227 certmonger[38965]: MDQwM1oXDTI3MTIwNDA4MDQwM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:03 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:03 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBALtWrqDB5+AG0Vj7vWahdvuWbtGlnrD8kP4Y Dec 3 08:04:03 np0005543227 certmonger[38965]: q6gB7+TA92uzKEmaQMBtNfNUbT93BcB0vmV9A8i0JC270mamMruvKDjPaDR3OGxV Dec 3 08:04:03 np0005543227 certmonger[38965]: ikwyVaMGQreItaAhBAgQNpTwd20SM4GWbXqEx9i4HDJ9zuOs93SNzlGLgWB51gSr Dec 3 08:04:03 np0005543227 certmonger[38965]: arlX5R4oeYPieSKsgDdvIGBLf/YXMZrzXRBBPXfSAr1lqiJJ+ejaPIigJ9D8uz6l Dec 3 08:04:03 np0005543227 certmonger[38965]: wXfRYzW8/szCQgeeunLgZaOBST3uhngussTpuTSQIrfXKd2L2YQmkKU7cGPXy8YG Dec 3 08:04:03 np0005543227 certmonger[38965]: 7VDQ+OKduYm3PcXoN1azD+/DBApHCdoHfQVocfGmU1ttF8ABe+ECAwEAAaOCAggw Dec 3 08:04:03 np0005543227 certmonger[38965]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:03 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:03 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:03 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:03 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:03 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCM1otK3bnB+28DOUD1TOWh2 Dec 3 08:04:03 np0005543227 certmonger[38965]: owJ0MIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:03 np0005543227 certmonger[38965]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:04:03 np0005543227 certmonger[38965]: AgOgMgwwbXlzcWwvbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:04:03 np0005543227 certmonger[38965]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Dec 3 08:04:03 np0005543227 certmonger[38965]: eXNxbBshbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:04:03 np0005543227 certmonger[38965]: DQEBCwUAA4IBgQAOxv4r6aUs38ucLe4sArbosmW5hpeAfWHPzIaBe2G1SNbsNA1R Dec 3 08:04:03 np0005543227 certmonger[38965]: xIWJG9/NIIUzjjd7etZ9vsv7bM/Pg8ztSZ/YXtvWcWbhr8fORoL3MfAoz3mRWJk8 Dec 3 08:04:03 np0005543227 certmonger[38965]: sLNqMShnteBObMrN2z1vZ0+V5dvLwv3ckTMDAqVNg+4pjCdHwCp8qQ4Eitw/ssoW Dec 3 08:04:03 np0005543227 certmonger[38965]: tmPMREPoJbIUnp4RDb8mHbHXaPx4JTzFFdWrkJqRpx3sjXSb8w0PZaDO9TQbIfq6 Dec 3 08:04:03 np0005543227 certmonger[38965]: zX3FiyiJyE6IFvDdcO+cIV31PYyavCn0CIhA0rOa7pLsVq0aR5RqGYUjYZB6Je2m Dec 3 08:04:03 np0005543227 certmonger[38965]: CAEq2Kv1kiodNjHgFIWKwWkAFNH6KOBBAGqy5iCnPt4RQxQ2ekPwrKNKehQ3fXWW Dec 3 08:04:03 np0005543227 certmonger[38965]: 0ZqN9h0/VIpaL5oNbHes+to5vgSgpIRC0/+j1BvGzTIidnudcimn3218CmwXPojF Dec 3 08:04:03 np0005543227 certmonger[38965]: ICJXonOYUJJeLj6TJ9or3+S4oXp4mZ/mvijFc+CMUFPGeUjcqsmAytcvqwZnicTl Dec 3 08:04:03 np0005543227 certmonger[38965]: OLIlXt4fpL/+TSI= Dec 3 08:04:03 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:03 np0005543227 certmonger[38965]: " Dec 3 08:04:03 np0005543227 certmonger[42190]: 2025-12-03 08:04:03 [42190] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:04:03 np0005543227 certmonger[42190]: MIIFdzCCA9+gAwIBAgIBNjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:03 np0005543227 certmonger[42190]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:03 np0005543227 certmonger[42190]: MDQwM1oXDTI3MTIwNDA4MDQwM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:03 np0005543227 certmonger[42190]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:03 np0005543227 certmonger[42190]: hvcNAQEBBQADggEPADCCAQoCggEBALtWrqDB5+AG0Vj7vWahdvuWbtGlnrD8kP4Y Dec 3 08:04:03 np0005543227 certmonger[42190]: q6gB7+TA92uzKEmaQMBtNfNUbT93BcB0vmV9A8i0JC270mamMruvKDjPaDR3OGxV Dec 3 08:04:03 np0005543227 certmonger[42190]: ikwyVaMGQreItaAhBAgQNpTwd20SM4GWbXqEx9i4HDJ9zuOs93SNzlGLgWB51gSr Dec 3 08:04:03 np0005543227 certmonger[42190]: arlX5R4oeYPieSKsgDdvIGBLf/YXMZrzXRBBPXfSAr1lqiJJ+ejaPIigJ9D8uz6l Dec 3 08:04:03 np0005543227 certmonger[42190]: wXfRYzW8/szCQgeeunLgZaOBST3uhngussTpuTSQIrfXKd2L2YQmkKU7cGPXy8YG Dec 3 08:04:03 np0005543227 certmonger[42190]: 7VDQ+OKduYm3PcXoN1azD+/DBApHCdoHfQVocfGmU1ttF8ABe+ECAwEAAaOCAggw Dec 3 08:04:03 np0005543227 certmonger[42190]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:03 np0005543227 certmonger[42190]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:03 np0005543227 certmonger[42190]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:03 np0005543227 certmonger[42190]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:03 np0005543227 certmonger[42190]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:03 np0005543227 certmonger[42190]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCM1otK3bnB+28DOUD1TOWh2 Dec 3 08:04:03 np0005543227 certmonger[42190]: owJ0MIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:03 np0005543227 certmonger[42190]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:04:03 np0005543227 certmonger[42190]: AgOgMgwwbXlzcWwvbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:04:03 np0005543227 certmonger[42190]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Dec 3 08:04:03 np0005543227 certmonger[42190]: eXNxbBshbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:04:03 np0005543227 certmonger[42190]: DQEBCwUAA4IBgQAOxv4r6aUs38ucLe4sArbosmW5hpeAfWHPzIaBe2G1SNbsNA1R Dec 3 08:04:03 np0005543227 certmonger[42190]: xIWJG9/NIIUzjjd7etZ9vsv7bM/Pg8ztSZ/YXtvWcWbhr8fORoL3MfAoz3mRWJk8 Dec 3 08:04:03 np0005543227 certmonger[42190]: sLNqMShnteBObMrN2z1vZ0+V5dvLwv3ckTMDAqVNg+4pjCdHwCp8qQ4Eitw/ssoW Dec 3 08:04:03 np0005543227 certmonger[42190]: tmPMREPoJbIUnp4RDb8mHbHXaPx4JTzFFdWrkJqRpx3sjXSb8w0PZaDO9TQbIfq6 Dec 3 08:04:03 np0005543227 certmonger[42190]: zX3FiyiJyE6IFvDdcO+cIV31PYyavCn0CIhA0rOa7pLsVq0aR5RqGYUjYZB6Je2m Dec 3 08:04:03 np0005543227 certmonger[42190]: CAEq2Kv1kiodNjHgFIWKwWkAFNH6KOBBAGqy5iCnPt4RQxQ2ekPwrKNKehQ3fXWW Dec 3 08:04:03 np0005543227 certmonger[42190]: 0ZqN9h0/VIpaL5oNbHes+to5vgSgpIRC0/+j1BvGzTIidnudcimn3218CmwXPojF Dec 3 08:04:03 np0005543227 certmonger[42190]: ICJXonOYUJJeLj6TJ9or3+S4oXp4mZ/mvijFc+CMUFPGeUjcqsmAytcvqwZnicTl Dec 3 08:04:03 np0005543227 certmonger[42190]: OLIlXt4fpL/+TSI= Dec 3 08:04:03 np0005543227 certmonger[42190]: -----END CERTIFICATE----- Dec 3 08:04:03 np0005543227 certmonger[42190]: ". Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Certificate submission still ongoing. Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Certificate submission postprocessing complete. Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Child status = 0. Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Child output: Dec 3 08:04:03 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nOLIlXt4fpL/+TSI=\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:04:03 np0005543227 certmonger[38965]: " Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:04:03 np0005543227 certmonger[38965]: MIIFdzCCA9+gAwIBAgIBNjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:03 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:03 np0005543227 certmonger[38965]: MDQwM1oXDTI3MTIwNDA4MDQwM1owPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:03 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:03 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBALtWrqDB5+AG0Vj7vWahdvuWbtGlnrD8kP4Y Dec 3 08:04:03 np0005543227 certmonger[38965]: q6gB7+TA92uzKEmaQMBtNfNUbT93BcB0vmV9A8i0JC270mamMruvKDjPaDR3OGxV Dec 3 08:04:03 np0005543227 certmonger[38965]: ikwyVaMGQreItaAhBAgQNpTwd20SM4GWbXqEx9i4HDJ9zuOs93SNzlGLgWB51gSr Dec 3 08:04:03 np0005543227 certmonger[38965]: arlX5R4oeYPieSKsgDdvIGBLf/YXMZrzXRBBPXfSAr1lqiJJ+ejaPIigJ9D8uz6l Dec 3 08:04:03 np0005543227 certmonger[38965]: wXfRYzW8/szCQgeeunLgZaOBST3uhngussTpuTSQIrfXKd2L2YQmkKU7cGPXy8YG Dec 3 08:04:03 np0005543227 certmonger[38965]: 7VDQ+OKduYm3PcXoN1azD+/DBApHCdoHfQVocfGmU1ttF8ABe+ECAwEAAaOCAggw Dec 3 08:04:03 np0005543227 certmonger[38965]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:03 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:03 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:03 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:03 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:03 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCM1otK3bnB+28DOUD1TOWh2 Dec 3 08:04:03 np0005543227 certmonger[38965]: owJ0MIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:03 np0005543227 certmonger[38965]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:04:03 np0005543227 certmonger[38965]: AgOgMgwwbXlzcWwvbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:04:03 np0005543227 certmonger[38965]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVt Dec 3 08:04:03 np0005543227 certmonger[38965]: eXNxbBshbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:04:03 np0005543227 certmonger[38965]: DQEBCwUAA4IBgQAOxv4r6aUs38ucLe4sArbosmW5hpeAfWHPzIaBe2G1SNbsNA1R Dec 3 08:04:03 np0005543227 certmonger[38965]: xIWJG9/NIIUzjjd7etZ9vsv7bM/Pg8ztSZ/YXtvWcWbhr8fORoL3MfAoz3mRWJk8 Dec 3 08:04:03 np0005543227 certmonger[38965]: sLNqMShnteBObMrN2z1vZ0+V5dvLwv3ckTMDAqVNg+4pjCdHwCp8qQ4Eitw/ssoW Dec 3 08:04:03 np0005543227 certmonger[38965]: tmPMREPoJbIUnp4RDb8mHbHXaPx4JTzFFdWrkJqRpx3sjXSb8w0PZaDO9TQbIfq6 Dec 3 08:04:03 np0005543227 certmonger[38965]: zX3FiyiJyE6IFvDdcO+cIV31PYyavCn0CIhA0rOa7pLsVq0aR5RqGYUjYZB6Je2m Dec 3 08:04:03 np0005543227 certmonger[38965]: CAEq2Kv1kiodNjHgFIWKwWkAFNH6KOBBAGqy5iCnPt4RQxQ2ekPwrKNKehQ3fXWW Dec 3 08:04:03 np0005543227 certmonger[38965]: 0ZqN9h0/VIpaL5oNbHes+to5vgSgpIRC0/+j1BvGzTIidnudcimn3218CmwXPojF Dec 3 08:04:03 np0005543227 certmonger[38965]: ICJXonOYUJJeLj6TJ9or3+S4oXp4mZ/mvijFc+CMUFPGeUjcqsmAytcvqwZnicTl Dec 3 08:04:03 np0005543227 certmonger[38965]: OLIlXt4fpL/+TSI= Dec 3 08:04:03 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:03 np0005543227 certmonger[38965]: ". Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] No hooks set for pre-save command. Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] No hooks set for post-save command. Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 certmonger[42194]: Certificate in file "/etc/pki/tls/certs/mysql.crt" issued by CA and saved. Dec 3 08:04:03 np0005543227 certmonger[38965]: 2025-12-03 08:04:03 [38965] Wrote to /var/lib/certmonger/requests/20251203080402 Dec 3 08:04:03 np0005543227 python3[42210]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:04:10 np0005543227 podman[42211]: 2025-12-03 08:04:03.993636329 +0000 UTC m=+0.050806888 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 08:04:10 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:11 np0005543227 python3[42277]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 cluster.common.tag/mariadb:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:04:11 np0005543227 podman[42278]: 2025-12-03 08:04:11.231465791 +0000 UTC m=+0.048739512 image tag b13c44df76d5b3bb87652b20507cc40d62568630b0249319c13c07bbb18c36c3 cluster.common.tag/mariadb:pcmklatest Dec 3 08:04:11 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:11 np0005543227 python3[42305]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:04:12 np0005543227 python3[42325]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:15 np0005543227 python3[42342]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:18 np0005543227 python3[42359]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:19 np0005543227 python3[42375]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:19 np0005543227 python3[42391]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:20 np0005543227 python3[42409]: ansible-certificate_request Invoked with name=neutron_ovn dns=['np0005543227.internalapi.ooo.test'] principal=['neutron_ovn/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:04:20 np0005543227 certmonger[42419]: " for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_REQ_PRINCIPAL" to "neutron_ovn/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:04:20 np0005543227 certmonger[42419]: " for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:20 np0005543227 certmonger[42419]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:04:20 np0005543227 certmonger[42419]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzWmL6XIE Dec 3 08:04:20 np0005543227 certmonger[42419]: a2wlJc5w/pgJWJycDGEgM9B35A5D2KBzKbMjm7L5JqkRbRabzQfSc2z5CAAEzc6J Dec 3 08:04:20 np0005543227 certmonger[42419]: 3TFcw+nUNj7Xv0xfnwX+6m2si3sNkVLR2feqNzWbRvsZAFryxa/SW2jJvOEzLaIP Dec 3 08:04:20 np0005543227 certmonger[42419]: 2K0uQ76/yNJ3mkypp0xdcCUFwcUYo1uimuAu73L+4/2WtCzudiTikIkaDk1IGxEG Dec 3 08:04:20 np0005543227 certmonger[42419]: YsRFrJSkJXminv9hOxcmV4zBY2elK8aF7qmljNJScyjmgxvJiUIXoyqXCZ9YiFa5 Dec 3 08:04:20 np0005543227 certmonger[42419]: BP1mPy180e5n1ji3dM93uWN/OlR4dSBYdUXrJvJV74tNxTsdADawDfTkYiR8Fgpl Dec 3 08:04:20 np0005543227 certmonger[42419]: 4h0Akwzdf2rzKwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:20 np0005543227 certmonger[42419]: ADAAMwAwADgAMAA0ADIAMDCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Dec 3 08:04:20 np0005543227 certmonger[42419]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:04:20 np0005543227 certmonger[42419]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZuZXV0cm9uX292bi9ucDAwMDU1NDMyMjcu Dec 3 08:04:20 np0005543227 certmonger[42419]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Dec 3 08:04:20 np0005543227 certmonger[42419]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25ldXRyb25fb3ZuGyFucDAwMDU1NDMyMjcu Dec 3 08:04:20 np0005543227 certmonger[42419]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Dec 3 08:04:20 np0005543227 certmonger[42419]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFBGYqF3kLUMi7BuIZgvqm46DOiG0 Dec 3 08:04:20 np0005543227 certmonger[42419]: MA0GCSqGSIb3DQEBCwUAA4IBAQDK/1yzjgXeOCs9q/9biPMfyi+9ML8GY9iOpLcX Dec 3 08:04:20 np0005543227 certmonger[42419]: AL8zyprKIglnp2prRZ59fY6o4l7sETucqbJvtpLnK4ySVOAWruutxEPK167HNtPp Dec 3 08:04:20 np0005543227 certmonger[42419]: 2pDItGcTkyG0AAGeVt4J/oA9C4mjJyRTm0CaDk0XV46SrbDHIh+qDhoJI7IwkrY6 Dec 3 08:04:20 np0005543227 certmonger[42419]: eSRZhrG8PirD3pIsWF32XRA3OTBsrf+UWdSOwxKJVnC+o8lt8V2fnM1oJFbxDix8 Dec 3 08:04:20 np0005543227 certmonger[42419]: mWYx9ewpWuXdR5PMe/iFn63DczWZ5CC97rmdINidyS/Fa/GOf+4wBaEZVUYpBiCx Dec 3 08:04:20 np0005543227 certmonger[42419]: iyDEZ/9sXwaOlNI741c4AQ00ArujlIGioC/ci9WZ8WV5/S4V Dec 3 08:04:20 np0005543227 certmonger[42419]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:20 np0005543227 certmonger[42419]: " for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzWmL6XIEa2wlJc5w/pgJWJycDGEgM9B35A5D2KBzKbMjm7L5JqkRbRabzQfSc2z5CAAEzc6J3TFcw+nUNj7Xv0xfnwX+6m2si3sNkVLR2feqNzWbRvsZAFryxa/SW2jJvOEzLaIP2K0uQ76/yNJ3mkypp0xdcCUFwcUYo1uimuAu73L+4/2WtCzudiTikIkaDk1IGxEGYsRFrJSkJXminv9hOxcmV4zBY2elK8aF7qmljNJScyjmgxvJiUIXoyqXCZ9YiFa5BP1mPy180e5n1ji3dM93uWN/OlR4dSBYdUXrJvJV74tNxTsdADawDfTkYiR8Fgpl4h0Akwzdf2rzKwIDAQAB" for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:20 np0005543227 certmonger[42419]: 2025-12-03 08:04:20 [42419] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:20 np0005543227 certmonger[38965]: 2025-12-03 08:04:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:20 np0005543227 certmonger[42419]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:04:21 np0005543227 certmonger[42419]: Certificate: "MIIFYzCCA8ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4MDQyMVoXDTI3MTIwNDA4MDQyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM1pi+lyBGtsJSXOcP6YCVicnAxhIDPQd+QOQ9igcymzI5uy+SapEW0Wm80H0nNs+QgABM3Oid0xXMPp1DY+179MX58F/uptrIt7DZFS0dn3qjc1m0b7GQBa8sWv0ltoybzhMy2iD9itLkO+v8jSd5pMqadMXXAlBcHFGKNboprgLu9y/uP9lrQs7nYk4pCJGg5NSBsRBmLERayUpCV5op7/YTsXJleMwWNnpSvGhe6ppYzSUnMo5oMbyYlCF6MqlwmfWIhWuQT9Zj8tfNHuZ9Y4t3TPd7ljfzpUeHUgWHVF6ybyVe+LTcU7HQA2sA305GIkfBYKZeIdAJMM3X9q8ysCAwEAAaOCAfQwggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJm5enKLlmllz+Aa3q9UfMUASiS/MIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9PTy5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAfhRIp1bF1bt8zs9liG/xbs81tQk1qAUZQffgcLtBQAEPUwC3K7ZRk8NhX897LGyUhV2fTldaQQehTpZw0W1qzpxaj3P4H4UeZZqnRbFPCv4765wIYvA5tK3wFSxHVSCgXLn9ASrlRmQPP/qQZ5nbnrjhUo3spFsi3GLdHUHKuQM5LxKSb3LnPTgS+u5rAXspgGlx1eq/NJnd5u6ZeHW1jXiWmgcrUmAsA5BOLuCNhQQu9aXAJtKilvhRaISF7Uz45MTvvgzfctLPXjhX/MJ/xbDncGjAQ2VCT3kXLXgV1mutO0cppYj/5611CDMZj8MrSYMO16K6edEBNLpaFVW1koIEIKwi8qbLQ729pY59ffNS46cpPZOzrmPMu6j13RkemGNwcpEFJzGtzgD/ED6EBVBOeTJRigHaZm23eRjoyerBVRcv8lywAqnWrnnw/rrxrDYz2YpVvYWJY6JU5Pz8Tyin7p48qbBgepKlKKvt1llTZDu3YRr1cbbUynoixkC5" Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Certificate submission still ongoing. Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Certificate submission attempt complete. Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Child status = 0. Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Child output: Dec 3 08:04:21 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:04:21 np0005543227 certmonger[38965]: MIIFYzCCA8ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:21 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:21 np0005543227 certmonger[38965]: MDQyMVoXDTI3MTIwNDA4MDQyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:21 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:21 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAM1pi+lyBGtsJSXOcP6YCVicnAxhIDPQd+QO Dec 3 08:04:21 np0005543227 certmonger[38965]: Q9igcymzI5uy+SapEW0Wm80H0nNs+QgABM3Oid0xXMPp1DY+179MX58F/uptrIt7 Dec 3 08:04:21 np0005543227 certmonger[38965]: DZFS0dn3qjc1m0b7GQBa8sWv0ltoybzhMy2iD9itLkO+v8jSd5pMqadMXXAlBcHF Dec 3 08:04:21 np0005543227 certmonger[38965]: GKNboprgLu9y/uP9lrQs7nYk4pCJGg5NSBsRBmLERayUpCV5op7/YTsXJleMwWNn Dec 3 08:04:21 np0005543227 certmonger[38965]: pSvGhe6ppYzSUnMo5oMbyYlCF6MqlwmfWIhWuQT9Zj8tfNHuZ9Y4t3TPd7ljfzpU Dec 3 08:04:21 np0005543227 certmonger[38965]: eHUgWHVF6ybyVe+LTcU7HQA2sA305GIkfBYKZeIdAJMM3X9q8ysCAwEAAaOCAfQw Dec 3 08:04:21 np0005543227 certmonger[38965]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:21 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:21 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:21 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:21 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:21 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJm5enKLlmllz+Aa3q9UfMUA Dec 3 08:04:21 np0005543227 certmonger[38965]: SiS/MIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:21 np0005543227 certmonger[38965]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTU0MzIyNy5p Dec 3 08:04:21 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:21 np0005543227 certmonger[38965]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTU0MzIyNy5p Dec 3 08:04:21 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAfhRIp1bF1bt8 Dec 3 08:04:21 np0005543227 certmonger[38965]: zs9liG/xbs81tQk1qAUZQffgcLtBQAEPUwC3K7ZRk8NhX897LGyUhV2fTldaQQeh Dec 3 08:04:21 np0005543227 certmonger[38965]: TpZw0W1qzpxaj3P4H4UeZZqnRbFPCv4765wIYvA5tK3wFSxHVSCgXLn9ASrlRmQP Dec 3 08:04:21 np0005543227 certmonger[38965]: P/qQZ5nbnrjhUo3spFsi3GLdHUHKuQM5LxKSb3LnPTgS+u5rAXspgGlx1eq/NJnd Dec 3 08:04:21 np0005543227 certmonger[38965]: 5u6ZeHW1jXiWmgcrUmAsA5BOLuCNhQQu9aXAJtKilvhRaISF7Uz45MTvvgzfctLP Dec 3 08:04:21 np0005543227 certmonger[38965]: XjhX/MJ/xbDncGjAQ2VCT3kXLXgV1mutO0cppYj/5611CDMZj8MrSYMO16K6edEB Dec 3 08:04:21 np0005543227 certmonger[38965]: NLpaFVW1koIEIKwi8qbLQ729pY59ffNS46cpPZOzrmPMu6j13RkemGNwcpEFJzGt Dec 3 08:04:21 np0005543227 certmonger[38965]: zgD/ED6EBVBOeTJRigHaZm23eRjoyerBVRcv8lywAqnWrnnw/rrxrDYz2YpVvYWJ Dec 3 08:04:21 np0005543227 certmonger[38965]: Y6JU5Pz8Tyin7p48qbBgepKlKKvt1llTZDu3YRr1cbbUynoixkC5 Dec 3 08:04:21 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:21 np0005543227 certmonger[38965]: " Dec 3 08:04:21 np0005543227 certmonger[42421]: 2025-12-03 08:04:21 [42421] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:04:21 np0005543227 certmonger[42421]: MIIFYzCCA8ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:21 np0005543227 certmonger[42421]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:21 np0005543227 certmonger[42421]: MDQyMVoXDTI3MTIwNDA4MDQyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:21 np0005543227 certmonger[42421]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:21 np0005543227 certmonger[42421]: hvcNAQEBBQADggEPADCCAQoCggEBAM1pi+lyBGtsJSXOcP6YCVicnAxhIDPQd+QO Dec 3 08:04:21 np0005543227 certmonger[42421]: Q9igcymzI5uy+SapEW0Wm80H0nNs+QgABM3Oid0xXMPp1DY+179MX58F/uptrIt7 Dec 3 08:04:21 np0005543227 certmonger[42421]: DZFS0dn3qjc1m0b7GQBa8sWv0ltoybzhMy2iD9itLkO+v8jSd5pMqadMXXAlBcHF Dec 3 08:04:21 np0005543227 certmonger[42421]: GKNboprgLu9y/uP9lrQs7nYk4pCJGg5NSBsRBmLERayUpCV5op7/YTsXJleMwWNn Dec 3 08:04:21 np0005543227 certmonger[42421]: pSvGhe6ppYzSUnMo5oMbyYlCF6MqlwmfWIhWuQT9Zj8tfNHuZ9Y4t3TPd7ljfzpU Dec 3 08:04:21 np0005543227 certmonger[42421]: eHUgWHVF6ybyVe+LTcU7HQA2sA305GIkfBYKZeIdAJMM3X9q8ysCAwEAAaOCAfQw Dec 3 08:04:21 np0005543227 certmonger[42421]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:21 np0005543227 certmonger[42421]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:21 np0005543227 certmonger[42421]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:21 np0005543227 certmonger[42421]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:21 np0005543227 certmonger[42421]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:21 np0005543227 certmonger[42421]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJm5enKLlmllz+Aa3q9UfMUA Dec 3 08:04:21 np0005543227 certmonger[42421]: SiS/MIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:21 np0005543227 certmonger[42421]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTU0MzIyNy5p Dec 3 08:04:21 np0005543227 certmonger[42421]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:21 np0005543227 certmonger[42421]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTU0MzIyNy5p Dec 3 08:04:21 np0005543227 certmonger[42421]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAfhRIp1bF1bt8 Dec 3 08:04:21 np0005543227 certmonger[42421]: zs9liG/xbs81tQk1qAUZQffgcLtBQAEPUwC3K7ZRk8NhX897LGyUhV2fTldaQQeh Dec 3 08:04:21 np0005543227 certmonger[42421]: TpZw0W1qzpxaj3P4H4UeZZqnRbFPCv4765wIYvA5tK3wFSxHVSCgXLn9ASrlRmQP Dec 3 08:04:21 np0005543227 certmonger[42421]: P/qQZ5nbnrjhUo3spFsi3GLdHUHKuQM5LxKSb3LnPTgS+u5rAXspgGlx1eq/NJnd Dec 3 08:04:21 np0005543227 certmonger[42421]: 5u6ZeHW1jXiWmgcrUmAsA5BOLuCNhQQu9aXAJtKilvhRaISF7Uz45MTvvgzfctLP Dec 3 08:04:21 np0005543227 certmonger[42421]: XjhX/MJ/xbDncGjAQ2VCT3kXLXgV1mutO0cppYj/5611CDMZj8MrSYMO16K6edEB Dec 3 08:04:21 np0005543227 certmonger[42421]: NLpaFVW1koIEIKwi8qbLQ729pY59ffNS46cpPZOzrmPMu6j13RkemGNwcpEFJzGt Dec 3 08:04:21 np0005543227 certmonger[42421]: zgD/ED6EBVBOeTJRigHaZm23eRjoyerBVRcv8lywAqnWrnnw/rrxrDYz2YpVvYWJ Dec 3 08:04:21 np0005543227 certmonger[42421]: Y6JU5Pz8Tyin7p48qbBgepKlKKvt1llTZDu3YRr1cbbUynoixkC5 Dec 3 08:04:21 np0005543227 certmonger[42421]: -----END CERTIFICATE----- Dec 3 08:04:21 np0005543227 certmonger[42421]: ". Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Certificate submission still ongoing. Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Certificate submission postprocessing complete. Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Child status = 0. Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Child output: Dec 3 08:04:21 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nY6JU5Pz8Tyin7p48qbBgepKlKKvt1llTZDu3YRr1cbbUynoixkC5\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:04:21 np0005543227 certmonger[38965]: " Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:04:21 np0005543227 certmonger[38965]: MIIFYzCCA8ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:21 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:21 np0005543227 certmonger[38965]: MDQyMVoXDTI3MTIwNDA4MDQyMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:21 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:21 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAM1pi+lyBGtsJSXOcP6YCVicnAxhIDPQd+QO Dec 3 08:04:21 np0005543227 certmonger[38965]: Q9igcymzI5uy+SapEW0Wm80H0nNs+QgABM3Oid0xXMPp1DY+179MX58F/uptrIt7 Dec 3 08:04:21 np0005543227 certmonger[38965]: DZFS0dn3qjc1m0b7GQBa8sWv0ltoybzhMy2iD9itLkO+v8jSd5pMqadMXXAlBcHF Dec 3 08:04:21 np0005543227 certmonger[38965]: GKNboprgLu9y/uP9lrQs7nYk4pCJGg5NSBsRBmLERayUpCV5op7/YTsXJleMwWNn Dec 3 08:04:21 np0005543227 certmonger[38965]: pSvGhe6ppYzSUnMo5oMbyYlCF6MqlwmfWIhWuQT9Zj8tfNHuZ9Y4t3TPd7ljfzpU Dec 3 08:04:21 np0005543227 certmonger[38965]: eHUgWHVF6ybyVe+LTcU7HQA2sA305GIkfBYKZeIdAJMM3X9q8ysCAwEAAaOCAfQw Dec 3 08:04:21 np0005543227 certmonger[38965]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:21 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:21 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:21 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:21 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:21 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJm5enKLlmllz+Aa3q9UfMUA Dec 3 08:04:21 np0005543227 certmonger[38965]: SiS/MIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:21 np0005543227 certmonger[38965]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5ldXRyb25fb3ZuL25wMDAwNTU0MzIyNy5p Dec 3 08:04:21 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:21 np0005543227 certmonger[38965]: Ty5URVNUoTswOaADAgEBoTIwMBsLbmV1dHJvbl9vdm4bIW5wMDAwNTU0MzIyNy5p Dec 3 08:04:21 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAfhRIp1bF1bt8 Dec 3 08:04:21 np0005543227 certmonger[38965]: zs9liG/xbs81tQk1qAUZQffgcLtBQAEPUwC3K7ZRk8NhX897LGyUhV2fTldaQQeh Dec 3 08:04:21 np0005543227 certmonger[38965]: TpZw0W1qzpxaj3P4H4UeZZqnRbFPCv4765wIYvA5tK3wFSxHVSCgXLn9ASrlRmQP Dec 3 08:04:21 np0005543227 certmonger[38965]: P/qQZ5nbnrjhUo3spFsi3GLdHUHKuQM5LxKSb3LnPTgS+u5rAXspgGlx1eq/NJnd Dec 3 08:04:21 np0005543227 certmonger[38965]: 5u6ZeHW1jXiWmgcrUmAsA5BOLuCNhQQu9aXAJtKilvhRaISF7Uz45MTvvgzfctLP Dec 3 08:04:21 np0005543227 certmonger[38965]: XjhX/MJ/xbDncGjAQ2VCT3kXLXgV1mutO0cppYj/5611CDMZj8MrSYMO16K6edEB Dec 3 08:04:21 np0005543227 certmonger[38965]: NLpaFVW1koIEIKwi8qbLQ729pY59ffNS46cpPZOzrmPMu6j13RkemGNwcpEFJzGt Dec 3 08:04:21 np0005543227 certmonger[38965]: zgD/ED6EBVBOeTJRigHaZm23eRjoyerBVRcv8lywAqnWrnnw/rrxrDYz2YpVvYWJ Dec 3 08:04:21 np0005543227 certmonger[38965]: Y6JU5Pz8Tyin7p48qbBgepKlKKvt1llTZDu3YRr1cbbUynoixkC5 Dec 3 08:04:21 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:21 np0005543227 certmonger[38965]: ". Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] No hooks set for pre-save command. Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] No hooks set for post-save command. Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:21 np0005543227 certmonger[42425]: Certificate in file "/etc/pki/tls/certs/neutron_ovn.crt" issued by CA and saved. Dec 3 08:04:21 np0005543227 certmonger[38965]: 2025-12-03 08:04:21 [38965] Wrote to /var/lib/certmonger/requests/20251203080420 Dec 3 08:04:22 np0005543227 python3[42441]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:04:22 np0005543227 python3[42461]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:25 np0005543227 python3[42478]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:29 np0005543227 python3[42495]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:30 np0005543227 python3[42511]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:30 np0005543227 python3[42527]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:31 np0005543227 python3[42545]: ansible-certificate_request Invoked with name=libvirt-vnc-client-cert dns=['np0005543227.internalapi.ooo.test'] principal=['libvirt-vnc/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/libvirt-vnc-client-cert.crt"#012service_key="/etc/pki/tls/private/libvirt-vnc-client-cert.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:04:31 np0005543227 certmonger[42555]: " for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_REQ_PRINCIPAL" to "libvirt-vnc/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:04:31 np0005543227 certmonger[42555]: " for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:31 np0005543227 certmonger[42555]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:04:31 np0005543227 certmonger[42555]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA14fhj0TQ Dec 3 08:04:31 np0005543227 certmonger[42555]: C8U9Y1ywwfX7UzqrgtVcIY+if/xmoCkgv9vXynuiBHnpmH4kclPu7h07FRQIi4wX Dec 3 08:04:31 np0005543227 certmonger[42555]: Spl+eDWPqNlf+Ra/yd3LvHEpIX/jZCACX80Jsrj3zfIiN3afc7YPO6jk3tFLAhA5 Dec 3 08:04:31 np0005543227 certmonger[42555]: YUAuR5ssqCXVpiVbfXMus+sCKzwYH3PLzDJwVB1JkmsqNL3PoLMa9BqhLsYgjb8M Dec 3 08:04:31 np0005543227 certmonger[42555]: zJZHZlWQuEaOxjvAjUI+aGr0rg4k+UBmk64BWTdO7ZQlHE0xw4cgtXP2eJXhM8SD Dec 3 08:04:31 np0005543227 certmonger[42555]: 8FkdRf4y69LzwOwe15RrMgNj0blu5S5+lD1qg6Z/+Urjogys3Ac0p65hqJmcgUkI Dec 3 08:04:31 np0005543227 certmonger[42555]: bcTuRbjnp3nvRwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:31 np0005543227 certmonger[42555]: ADAAMwAwADgAMAA0ADMAMTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Dec 3 08:04:31 np0005543227 certmonger[42555]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:04:31 np0005543227 certmonger[42555]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZsaWJ2aXJ0LXZuYy9ucDAwMDU1NDMyMjcu Dec 3 08:04:31 np0005543227 certmonger[42555]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Dec 3 08:04:31 np0005543227 certmonger[42555]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC2xpYnZpcnQtdm5jGyFucDAwMDU1NDMyMjcu Dec 3 08:04:31 np0005543227 certmonger[42555]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Dec 3 08:04:31 np0005543227 certmonger[42555]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFBGYqF3kLUMi7BuIZgvqm46DOiG0 Dec 3 08:04:31 np0005543227 certmonger[42555]: MA0GCSqGSIb3DQEBCwUAA4IBAQCCP6ZcMRkgXrJexnAgBxBUb/fPgWeHN+CfBPuV Dec 3 08:04:31 np0005543227 certmonger[42555]: qYkvg1o/QLrs3pB5BFm082efEIaGrhV38ZK4oDgW6PLqKQ9n0Stjlcq1vAOoQmB+ Dec 3 08:04:31 np0005543227 certmonger[42555]: TFmTSz7efi1VFt4LYJFcnH11pmpbSTkGTiktrSgxSwkALD+1vs0a8imNnDHIUII5 Dec 3 08:04:31 np0005543227 certmonger[42555]: suvQAEdgNqpLQk84C3rjt/Jgbk0ZOiEnPjctlO98/x3Is6eNM+egItVN33yphxlk Dec 3 08:04:31 np0005543227 certmonger[42555]: zcP4o/T1BOVE397d5i422dfSqXTtsiuel2vo2id7TRSHyNS+JBU0/RZ2Tv3wlxm3 Dec 3 08:04:31 np0005543227 certmonger[42555]: 3WKyAsd1wU2BrhpVDRK5ELoW1TwOAiSC5jQJw4KsebrSI9xK Dec 3 08:04:31 np0005543227 certmonger[42555]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:31 np0005543227 certmonger[42555]: " for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDXh+GPRNALxT1jXLDB9ftTOquC1Vwhj6J//GagKSC/29fKe6IEeemYfiRyU+7uHTsVFAiLjBdKmX54NY+o2V/5Fr/J3cu8cSkhf+NkIAJfzQmyuPfN8iI3dp9ztg87qOTe0UsCEDlhQC5HmyyoJdWmJVt9cy6z6wIrPBgfc8vMMnBUHUmSayo0vc+gsxr0GqEuxiCNvwzMlkdmVZC4Ro7GO8CNQj5oavSuDiT5QGaTrgFZN07tlCUcTTHDhyC1c/Z4leEzxIPwWR1F/jLr0vPA7B7XlGsyA2PRuW7lLn6UPWqDpn/5SuOiDKzcBzSnrmGomZyBSQhtxO5FuOenee9HAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAUL6u3bK8dtn//6bXJPZhEXVCNUSVt4weOHZKOh6swuevcZ3u2kzk3lftfM+z8kORiHyrDAFYFYsInEsIe0GLnfuaElBjxN9+nPavAK/zX0+4rd7QqHy6t+vX5bCZFkmj5BkXGNgGTFpbBXH/MeCoTMW9CjJ91brlXyHz9AembSnRR41F0zS2R7cvZypqARkSgAr45Ad/31Bk0+EQLIbi2i1V+VzQ27SQi/FAl8iCC0tqfJ2VQl5D5RDp+j4YczSKF294MZfaaQMGf5xybv+72GajojXCGSi5xCTXdBAaOPViBxgSprBa/qnewn4MTPpx2RuMJlW89z9Gt1dG4IX5Sw==" for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA14fhj0TQC8U9Y1ywwfX7UzqrgtVcIY+if/xmoCkgv9vXynuiBHnpmH4kclPu7h07FRQIi4wXSpl+eDWPqNlf+Ra/yd3LvHEpIX/jZCACX80Jsrj3zfIiN3afc7YPO6jk3tFLAhA5YUAuR5ssqCXVpiVbfXMus+sCKzwYH3PLzDJwVB1JkmsqNL3PoLMa9BqhLsYgjb8MzJZHZlWQuEaOxjvAjUI+aGr0rg4k+UBmk64BWTdO7ZQlHE0xw4cgtXP2eJXhM8SD8FkdRf4y69LzwOwe15RrMgNj0blu5S5+lD1qg6Z/+Urjogys3Ac0p65hqJmcgUkIbcTuRbjnp3nvRwIDAQAB" for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:31 np0005543227 certmonger[42555]: 2025-12-03 08:04:31 [42555] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[42555]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:04:31 np0005543227 certmonger[42555]: Certificate: "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" Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Certificate submission still ongoing. Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Certificate submission attempt complete. Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Child status = 0. Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Child output: Dec 3 08:04:31 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:04:31 np0005543227 certmonger[38965]: MIIFYzCCA8ugAwIBAgIBQDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:31 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:31 np0005543227 certmonger[38965]: MDQzMVoXDTI3MTIwNDA4MDQzMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:31 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:31 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBANeH4Y9E0AvFPWNcsMH1+1M6q4LVXCGPon/8 Dec 3 08:04:31 np0005543227 certmonger[38965]: ZqApIL/b18p7ogR56Zh+JHJT7u4dOxUUCIuMF0qZfng1j6jZX/kWv8ndy7xxKSF/ Dec 3 08:04:31 np0005543227 certmonger[38965]: 42QgAl/NCbK4983yIjd2n3O2Dzuo5N7RSwIQOWFALkebLKgl1aYlW31zLrPrAis8 Dec 3 08:04:31 np0005543227 certmonger[38965]: GB9zy8wycFQdSZJrKjS9z6CzGvQaoS7GII2/DMyWR2ZVkLhGjsY7wI1CPmhq9K4O Dec 3 08:04:31 np0005543227 certmonger[38965]: JPlAZpOuAVk3Tu2UJRxNMcOHILVz9niV4TPEg/BZHUX+MuvS88DsHteUazIDY9G5 Dec 3 08:04:31 np0005543227 certmonger[38965]: buUufpQ9aoOmf/lK46IMrNwHNKeuYaiZnIFJCG3E7kW456d570cCAwEAAaOCAfQw Dec 3 08:04:31 np0005543227 certmonger[38965]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:31 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:31 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:31 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:31 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:31 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCg3N51mwU+Ygt42cn8Xzmf/ Dec 3 08:04:31 np0005543227 certmonger[38965]: pYI9MIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:31 np0005543227 certmonger[38965]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTU0MzIyNy5p Dec 3 08:04:31 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:31 np0005543227 certmonger[38965]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTU0MzIyNy5p Dec 3 08:04:31 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAEMS4jHcqD7bv Dec 3 08:04:31 np0005543227 certmonger[38965]: 5Yh3jXMl1tmVE5P98HcSH5akQ0cp9fgMXX8p0eCopeGfvW8wuVuk7FCxEUwVSicY Dec 3 08:04:31 np0005543227 certmonger[38965]: L/jnPpArSGBCwaVEfkFDECJcjRlgLrujFaCQJAZy7BRcveZt8NsXdU09gD4N3Qip Dec 3 08:04:31 np0005543227 certmonger[38965]: 92B3YJ+4VQm/x3xRCnidDBG4Wu7B5LA4N6DeAT9JlKQW5gh7fu7rRp1nSyW8Eer3 Dec 3 08:04:31 np0005543227 certmonger[38965]: CvBW56Oa0jprWUkiqnxp8C0WLhDi7v0T/g2QCbTLRc1DVcrUvDHixii2xBAENEST Dec 3 08:04:31 np0005543227 certmonger[38965]: sh39Eg2yT/jTKn0JFf/3rNkJ+JTcdBFXFNwm4Ry1y71RDcblY28c6pFZ6YBZsXDG Dec 3 08:04:31 np0005543227 certmonger[38965]: 53h5Cv2+Xd++uKJYyZxo8EjtgmdJDjzAvQvNPIqA49TOsYes0AbOS24VTGTLPev/ Dec 3 08:04:31 np0005543227 certmonger[38965]: EACM1X0ZEOyhB2i4DugqAWaz+jW0qJQ99ig1wrZsZZ+3C9uymbNJRx8s3aCSa5QX Dec 3 08:04:31 np0005543227 certmonger[38965]: ebvNircwMRwIBT2oRQfd7AAifgqmpNkZqKfeHMlqBFi8CnTvOZvw Dec 3 08:04:31 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:31 np0005543227 certmonger[38965]: " Dec 3 08:04:31 np0005543227 certmonger[42557]: 2025-12-03 08:04:31 [42557] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:04:31 np0005543227 certmonger[42557]: MIIFYzCCA8ugAwIBAgIBQDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:31 np0005543227 certmonger[42557]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:31 np0005543227 certmonger[42557]: MDQzMVoXDTI3MTIwNDA4MDQzMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:31 np0005543227 certmonger[42557]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:31 np0005543227 certmonger[42557]: hvcNAQEBBQADggEPADCCAQoCggEBANeH4Y9E0AvFPWNcsMH1+1M6q4LVXCGPon/8 Dec 3 08:04:31 np0005543227 certmonger[42557]: ZqApIL/b18p7ogR56Zh+JHJT7u4dOxUUCIuMF0qZfng1j6jZX/kWv8ndy7xxKSF/ Dec 3 08:04:31 np0005543227 certmonger[42557]: 42QgAl/NCbK4983yIjd2n3O2Dzuo5N7RSwIQOWFALkebLKgl1aYlW31zLrPrAis8 Dec 3 08:04:31 np0005543227 certmonger[42557]: GB9zy8wycFQdSZJrKjS9z6CzGvQaoS7GII2/DMyWR2ZVkLhGjsY7wI1CPmhq9K4O Dec 3 08:04:31 np0005543227 certmonger[42557]: JPlAZpOuAVk3Tu2UJRxNMcOHILVz9niV4TPEg/BZHUX+MuvS88DsHteUazIDY9G5 Dec 3 08:04:31 np0005543227 certmonger[42557]: buUufpQ9aoOmf/lK46IMrNwHNKeuYaiZnIFJCG3E7kW456d570cCAwEAAaOCAfQw Dec 3 08:04:31 np0005543227 certmonger[42557]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:31 np0005543227 certmonger[42557]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:31 np0005543227 certmonger[42557]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:31 np0005543227 certmonger[42557]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:31 np0005543227 certmonger[42557]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:31 np0005543227 certmonger[42557]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCg3N51mwU+Ygt42cn8Xzmf/ Dec 3 08:04:31 np0005543227 certmonger[42557]: pYI9MIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:31 np0005543227 certmonger[42557]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTU0MzIyNy5p Dec 3 08:04:31 np0005543227 certmonger[42557]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:31 np0005543227 certmonger[42557]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTU0MzIyNy5p Dec 3 08:04:31 np0005543227 certmonger[42557]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAEMS4jHcqD7bv Dec 3 08:04:31 np0005543227 certmonger[42557]: 5Yh3jXMl1tmVE5P98HcSH5akQ0cp9fgMXX8p0eCopeGfvW8wuVuk7FCxEUwVSicY Dec 3 08:04:31 np0005543227 certmonger[42557]: L/jnPpArSGBCwaVEfkFDECJcjRlgLrujFaCQJAZy7BRcveZt8NsXdU09gD4N3Qip Dec 3 08:04:31 np0005543227 certmonger[42557]: 92B3YJ+4VQm/x3xRCnidDBG4Wu7B5LA4N6DeAT9JlKQW5gh7fu7rRp1nSyW8Eer3 Dec 3 08:04:31 np0005543227 certmonger[42557]: CvBW56Oa0jprWUkiqnxp8C0WLhDi7v0T/g2QCbTLRc1DVcrUvDHixii2xBAENEST Dec 3 08:04:31 np0005543227 certmonger[42557]: sh39Eg2yT/jTKn0JFf/3rNkJ+JTcdBFXFNwm4Ry1y71RDcblY28c6pFZ6YBZsXDG Dec 3 08:04:31 np0005543227 certmonger[42557]: 53h5Cv2+Xd++uKJYyZxo8EjtgmdJDjzAvQvNPIqA49TOsYes0AbOS24VTGTLPev/ Dec 3 08:04:31 np0005543227 certmonger[42557]: EACM1X0ZEOyhB2i4DugqAWaz+jW0qJQ99ig1wrZsZZ+3C9uymbNJRx8s3aCSa5QX Dec 3 08:04:31 np0005543227 certmonger[42557]: ebvNircwMRwIBT2oRQfd7AAifgqmpNkZqKfeHMlqBFi8CnTvOZvw Dec 3 08:04:31 np0005543227 certmonger[42557]: -----END CERTIFICATE----- Dec 3 08:04:31 np0005543227 certmonger[42557]: ". Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Certificate submission still ongoing. Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Certificate submission postprocessing complete. Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Child status = 0. Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Child output: Dec 3 08:04:31 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nebvNircwMRwIBT2oRQfd7AAifgqmpNkZqKfeHMlqBFi8CnTvOZvw\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:04:31 np0005543227 certmonger[38965]: " Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:04:31 np0005543227 certmonger[38965]: MIIFYzCCA8ugAwIBAgIBQDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:31 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:31 np0005543227 certmonger[38965]: MDQzMVoXDTI3MTIwNDA4MDQzMVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:31 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:31 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBANeH4Y9E0AvFPWNcsMH1+1M6q4LVXCGPon/8 Dec 3 08:04:31 np0005543227 certmonger[38965]: ZqApIL/b18p7ogR56Zh+JHJT7u4dOxUUCIuMF0qZfng1j6jZX/kWv8ndy7xxKSF/ Dec 3 08:04:31 np0005543227 certmonger[38965]: 42QgAl/NCbK4983yIjd2n3O2Dzuo5N7RSwIQOWFALkebLKgl1aYlW31zLrPrAis8 Dec 3 08:04:31 np0005543227 certmonger[38965]: GB9zy8wycFQdSZJrKjS9z6CzGvQaoS7GII2/DMyWR2ZVkLhGjsY7wI1CPmhq9K4O Dec 3 08:04:31 np0005543227 certmonger[38965]: JPlAZpOuAVk3Tu2UJRxNMcOHILVz9niV4TPEg/BZHUX+MuvS88DsHteUazIDY9G5 Dec 3 08:04:31 np0005543227 certmonger[38965]: buUufpQ9aoOmf/lK46IMrNwHNKeuYaiZnIFJCG3E7kW456d570cCAwEAAaOCAfQw Dec 3 08:04:31 np0005543227 certmonger[38965]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:31 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:31 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:31 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:31 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:31 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCg3N51mwU+Ygt42cn8Xzmf/ Dec 3 08:04:31 np0005543227 certmonger[38965]: pYI9MIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:31 np0005543227 certmonger[38965]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNmxpYnZpcnQtdm5jL25wMDAwNTU0MzIyNy5p Dec 3 08:04:31 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:31 np0005543227 certmonger[38965]: Ty5URVNUoTswOaADAgEBoTIwMBsLbGlidmlydC12bmMbIW5wMDAwNTU0MzIyNy5p Dec 3 08:04:31 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAEMS4jHcqD7bv Dec 3 08:04:31 np0005543227 certmonger[38965]: 5Yh3jXMl1tmVE5P98HcSH5akQ0cp9fgMXX8p0eCopeGfvW8wuVuk7FCxEUwVSicY Dec 3 08:04:31 np0005543227 certmonger[38965]: L/jnPpArSGBCwaVEfkFDECJcjRlgLrujFaCQJAZy7BRcveZt8NsXdU09gD4N3Qip Dec 3 08:04:31 np0005543227 certmonger[38965]: 92B3YJ+4VQm/x3xRCnidDBG4Wu7B5LA4N6DeAT9JlKQW5gh7fu7rRp1nSyW8Eer3 Dec 3 08:04:31 np0005543227 certmonger[38965]: CvBW56Oa0jprWUkiqnxp8C0WLhDi7v0T/g2QCbTLRc1DVcrUvDHixii2xBAENEST Dec 3 08:04:31 np0005543227 certmonger[38965]: sh39Eg2yT/jTKn0JFf/3rNkJ+JTcdBFXFNwm4Ry1y71RDcblY28c6pFZ6YBZsXDG Dec 3 08:04:31 np0005543227 certmonger[38965]: 53h5Cv2+Xd++uKJYyZxo8EjtgmdJDjzAvQvNPIqA49TOsYes0AbOS24VTGTLPev/ Dec 3 08:04:31 np0005543227 certmonger[38965]: EACM1X0ZEOyhB2i4DugqAWaz+jW0qJQ99ig1wrZsZZ+3C9uymbNJRx8s3aCSa5QX Dec 3 08:04:31 np0005543227 certmonger[38965]: ebvNircwMRwIBT2oRQfd7AAifgqmpNkZqKfeHMlqBFi8CnTvOZvw Dec 3 08:04:31 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:31 np0005543227 certmonger[38965]: ". Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] No hooks set for pre-save command. Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:31 np0005543227 certmonger[38965]: 2025-12-03 08:04:31 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:32 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:32 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:32 np0005543227 certmonger[38965]: 2025-12-03 08:04:32 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:32 np0005543227 certmonger[38965]: 2025-12-03 08:04:32 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:32 np0005543227 certmonger[42633]: Certificate in file "/etc/pki/tls/certs/libvirt-vnc-client-cert.crt" issued by CA and saved. Dec 3 08:04:32 np0005543227 certmonger[38965]: 2025-12-03 08:04:32 [38965] Wrote to /var/lib/certmonger/requests/20251203080431 Dec 3 08:04:33 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:33 np0005543227 python3[42649]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:04:33 np0005543227 python3[42669]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:36 np0005543227 python3[42686]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:40 np0005543227 python3[42759]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:40 np0005543227 python3[42775]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:41 np0005543227 python3[42791]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:41 np0005543227 python3[42809]: ansible-certificate_request Invoked with name=novnc-proxy dns=['np0005543227.internalapi.ooo.test'] principal=['novnc-proxy/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep nova_vnc_proxy)#012service_crt="/etc/pki/tls/certs/novnc-proxy.crt"#012service_key="/etc/pki/tls/private/novnc-proxy.key"#012# Copy the new cert from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new key from the mount-point to the real path#012podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012#012# Set permissions#012podman exec -u root "$container_name" chmod 0644 $service_crt#012podman exec -u root "$container_name" chmod 0640 $service_key#012podman exec -u root "$container_name" chgrp qemu $service_key#012#012# No need to trigger a reload for novnc proxy since the cert is not cached#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:04:42 np0005543227 certmonger[42819]: " for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_REQ_PRINCIPAL" to "novnc-proxy/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:04:42 np0005543227 certmonger[42819]: " for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:42 np0005543227 certmonger[42819]: MIID4DCCAsgCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:04:42 np0005543227 certmonger[42819]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAunIVeDrW Dec 3 08:04:42 np0005543227 certmonger[42819]: KOejhTmQED8GkC8fCTyraUeyzJ6UmfH7h0tzsKHFm7a2mgck/oRABpUabwlnTXym Dec 3 08:04:42 np0005543227 certmonger[42819]: YZh06QYOM3E2KvLz1Mc2y7D7cIudeC94UVaUeojkKDho8FQEZpTXzz9Z44t+P1Cv Dec 3 08:04:42 np0005543227 certmonger[42819]: xOoOAqJDzKldt8uAKxsFOolcHqTtfep5flYFHcVMBErG3TERsk0UUAxQ/MHWWKco Dec 3 08:04:42 np0005543227 certmonger[42819]: tKAQSk2k4A0y41u1Grn6npKveGyorhKb9XbdaM83F/RR5sfpBfX6pTg+JWPmt5is Dec 3 08:04:42 np0005543227 certmonger[42819]: DwRyz9HrklsV2B0buZQSKtSYJNW7MtfQzNUvmdt/QGWadR6Y1OHWHz+LsHEnoPer Dec 3 08:04:42 np0005543227 certmonger[42819]: 2F6n3/phTKumTwIDAQABoIIBbTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:42 np0005543227 certmonger[42819]: ADAAMwAwADgAMAA0ADQAMTCCATwGCSqGSIb3DQEJDjGCAS0wggEpMAsGA1UdDwQE Dec 3 08:04:42 np0005543227 certmonger[42819]: AwIFoDCBzQYDVR0RBIHFMIHCgiFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:04:42 np0005543227 certmonger[42819]: LnRlc3SgRgYKKwYBBAGCNxQCA6A4DDZub3ZuYy1wcm94eS9ucDAwMDU1NDMyMjcu Dec 3 08:04:42 np0005543227 certmonger[42819]: aW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgVQYGKwYBBQICoEswSaAKGwhP Dec 3 08:04:42 np0005543227 certmonger[42819]: T08uVEVTVKE7MDmgAwIBAaEyMDAbC25vdm5jLXByb3h5GyFucDAwMDU1NDMyMjcu Dec 3 08:04:42 np0005543227 certmonger[42819]: aW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUF Dec 3 08:04:42 np0005543227 certmonger[42819]: BwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFBGYqF3kLUMi7BuIZgvqm46DOiG0 Dec 3 08:04:42 np0005543227 certmonger[42819]: MA0GCSqGSIb3DQEBCwUAA4IBAQBjuDaJnpMskVSci6BWWUZCffkYnZzVncj5gLS3 Dec 3 08:04:42 np0005543227 certmonger[42819]: Ry9qBiQcc/61QBUx6ffW27ZY6GsrGWxETxokCOZ7GfeNpr4yTv6bz1jc1TMH+EN1 Dec 3 08:04:42 np0005543227 certmonger[42819]: tUsfi02g8cy08gY5z5DEnhf4GWkFposyiFX73pYWv9VVRQMPObAZDkys2G+Gvfss Dec 3 08:04:42 np0005543227 certmonger[42819]: js++waFS4bgTr5v+oJRVqv6V0MgTvXL8XtsEF8UngENyfGWIyJ/sQFXHlhkcL81g Dec 3 08:04:42 np0005543227 certmonger[42819]: QpkCdQK7V6M+1c8yZKNbKjb0iwxpN+zLf+NlI9Hpe0jL1+lcwYFsQk5MEzqb0xDX Dec 3 08:04:42 np0005543227 certmonger[42819]: XBrckeXAYLkzyhIrOv4GwvlqF3T+t6Uwx8bHF8nsZmlphASw Dec 3 08:04:42 np0005543227 certmonger[42819]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:42 np0005543227 certmonger[42819]: " for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAunIVeDrWKOejhTmQED8GkC8fCTyraUeyzJ6UmfH7h0tzsKHFm7a2mgck/oRABpUabwlnTXymYZh06QYOM3E2KvLz1Mc2y7D7cIudeC94UVaUeojkKDho8FQEZpTXzz9Z44t+P1CvxOoOAqJDzKldt8uAKxsFOolcHqTtfep5flYFHcVMBErG3TERsk0UUAxQ/MHWWKcotKAQSk2k4A0y41u1Grn6npKveGyorhKb9XbdaM83F/RR5sfpBfX6pTg+JWPmt5isDwRyz9HrklsV2B0buZQSKtSYJNW7MtfQzNUvmdt/QGWadR6Y1OHWHz+LsHEnoPer2F6n3/phTKumTwIDAQAB" for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:42 np0005543227 certmonger[42819]: 2025-12-03 08:04:42 [42819] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[42819]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:04:42 np0005543227 certmonger[42819]: Certificate: "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" Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Certificate submission still ongoing. Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Certificate submission attempt complete. Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Child status = 0. Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Child output: Dec 3 08:04:42 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:04:42 np0005543227 certmonger[38965]: MIIFYzCCA8ugAwIBAgIBQjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:42 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:42 np0005543227 certmonger[38965]: MDQ0MloXDTI3MTIwNDA4MDQ0MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:42 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:42 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBALpyFXg61ijno4U5kBA/BpAvHwk8q2lHssye Dec 3 08:04:42 np0005543227 certmonger[38965]: lJnx+4dLc7ChxZu2tpoHJP6EQAaVGm8JZ018pmGYdOkGDjNxNiry89THNsuw+3CL Dec 3 08:04:42 np0005543227 certmonger[38965]: nXgveFFWlHqI5Cg4aPBUBGaU188/WeOLfj9Qr8TqDgKiQ8ypXbfLgCsbBTqJXB6k Dec 3 08:04:42 np0005543227 certmonger[38965]: 7X3qeX5WBR3FTARKxt0xEbJNFFAMUPzB1linKLSgEEpNpOANMuNbtRq5+p6Sr3hs Dec 3 08:04:42 np0005543227 certmonger[38965]: qK4Sm/V23WjPNxf0UebH6QX1+qU4PiVj5reYrA8Ecs/R65JbFdgdG7mUEirUmCTV Dec 3 08:04:42 np0005543227 certmonger[38965]: uzLX0MzVL5nbf0BlmnUemNTh1h8/i7BxJ6D3q9hep9/6YUyrpk8CAwEAAaOCAfQw Dec 3 08:04:42 np0005543227 certmonger[38965]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:42 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:42 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:42 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:42 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:42 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFItBHx52wHQLTBGEP0qJ7ppD Dec 3 08:04:42 np0005543227 certmonger[38965]: 2S8mMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:42 np0005543227 certmonger[38965]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTU0MzIyNy5p Dec 3 08:04:42 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:42 np0005543227 certmonger[38965]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTU0MzIyNy5p Dec 3 08:04:42 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAF2wl9UdMPccv Dec 3 08:04:42 np0005543227 certmonger[38965]: ZJD/HocVvZTTNwyFObbcfFblPcvaxnauUihobbGPkOHZGG5TaEeczTPlE+wr+I9W Dec 3 08:04:42 np0005543227 certmonger[38965]: HS94B3iKSc/nX8eaImNhrr1M0mO8R3TXImvy7LwPyUSvX7L9jVecvPVqDxKrlJaB Dec 3 08:04:42 np0005543227 certmonger[38965]: /oGwpVPenoJ7fYSkV9hnsnzF5HFHZ2cHZvhWK7z7acPWCaXwXZ1C0qBzP1CB2+eA Dec 3 08:04:42 np0005543227 certmonger[38965]: FUkykBLKU97L8idh14CdNO0DF3KfWXVfC14WUt9LgPRUM53OkX2Mu2z1BXZp9MTp Dec 3 08:04:42 np0005543227 certmonger[38965]: fpyJv57QCzwyg7IbON9IaXKJDg4+RV29L6LUhI8ZhBWSDI4x3H9cwOmwJwdWImZu Dec 3 08:04:42 np0005543227 certmonger[38965]: qFzyWtmIGW4HPcsj6wzTsm236X+LcLGH9ASaMVCWxX1tEdbBMyfki+31JnrNiSPn Dec 3 08:04:42 np0005543227 certmonger[38965]: yQqxa4BQQlJSSZ9gWiygMhz0hTKN55soqp16Gg1ieQNeWNuotAMBOQU0LdUVNvEg Dec 3 08:04:42 np0005543227 certmonger[38965]: TrFCTcMiyXmiMjMz8KOD3sNbcQi3LtyaxgYutJThuRcnBmdbcJnl Dec 3 08:04:42 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:42 np0005543227 certmonger[38965]: " Dec 3 08:04:42 np0005543227 certmonger[42821]: 2025-12-03 08:04:42 [42821] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:04:42 np0005543227 certmonger[42821]: MIIFYzCCA8ugAwIBAgIBQjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:42 np0005543227 certmonger[42821]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:42 np0005543227 certmonger[42821]: MDQ0MloXDTI3MTIwNDA4MDQ0MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:42 np0005543227 certmonger[42821]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:42 np0005543227 certmonger[42821]: hvcNAQEBBQADggEPADCCAQoCggEBALpyFXg61ijno4U5kBA/BpAvHwk8q2lHssye Dec 3 08:04:42 np0005543227 certmonger[42821]: lJnx+4dLc7ChxZu2tpoHJP6EQAaVGm8JZ018pmGYdOkGDjNxNiry89THNsuw+3CL Dec 3 08:04:42 np0005543227 certmonger[42821]: nXgveFFWlHqI5Cg4aPBUBGaU188/WeOLfj9Qr8TqDgKiQ8ypXbfLgCsbBTqJXB6k Dec 3 08:04:42 np0005543227 certmonger[42821]: 7X3qeX5WBR3FTARKxt0xEbJNFFAMUPzB1linKLSgEEpNpOANMuNbtRq5+p6Sr3hs Dec 3 08:04:42 np0005543227 certmonger[42821]: qK4Sm/V23WjPNxf0UebH6QX1+qU4PiVj5reYrA8Ecs/R65JbFdgdG7mUEirUmCTV Dec 3 08:04:42 np0005543227 certmonger[42821]: uzLX0MzVL5nbf0BlmnUemNTh1h8/i7BxJ6D3q9hep9/6YUyrpk8CAwEAAaOCAfQw Dec 3 08:04:42 np0005543227 certmonger[42821]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:42 np0005543227 certmonger[42821]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:42 np0005543227 certmonger[42821]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:42 np0005543227 certmonger[42821]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:42 np0005543227 certmonger[42821]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:42 np0005543227 certmonger[42821]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFItBHx52wHQLTBGEP0qJ7ppD Dec 3 08:04:42 np0005543227 certmonger[42821]: 2S8mMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:42 np0005543227 certmonger[42821]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTU0MzIyNy5p Dec 3 08:04:42 np0005543227 certmonger[42821]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:42 np0005543227 certmonger[42821]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTU0MzIyNy5p Dec 3 08:04:42 np0005543227 certmonger[42821]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAF2wl9UdMPccv Dec 3 08:04:42 np0005543227 certmonger[42821]: ZJD/HocVvZTTNwyFObbcfFblPcvaxnauUihobbGPkOHZGG5TaEeczTPlE+wr+I9W Dec 3 08:04:42 np0005543227 certmonger[42821]: HS94B3iKSc/nX8eaImNhrr1M0mO8R3TXImvy7LwPyUSvX7L9jVecvPVqDxKrlJaB Dec 3 08:04:42 np0005543227 certmonger[42821]: /oGwpVPenoJ7fYSkV9hnsnzF5HFHZ2cHZvhWK7z7acPWCaXwXZ1C0qBzP1CB2+eA Dec 3 08:04:42 np0005543227 certmonger[42821]: FUkykBLKU97L8idh14CdNO0DF3KfWXVfC14WUt9LgPRUM53OkX2Mu2z1BXZp9MTp Dec 3 08:04:42 np0005543227 certmonger[42821]: fpyJv57QCzwyg7IbON9IaXKJDg4+RV29L6LUhI8ZhBWSDI4x3H9cwOmwJwdWImZu Dec 3 08:04:42 np0005543227 certmonger[42821]: qFzyWtmIGW4HPcsj6wzTsm236X+LcLGH9ASaMVCWxX1tEdbBMyfki+31JnrNiSPn Dec 3 08:04:42 np0005543227 certmonger[42821]: yQqxa4BQQlJSSZ9gWiygMhz0hTKN55soqp16Gg1ieQNeWNuotAMBOQU0LdUVNvEg Dec 3 08:04:42 np0005543227 certmonger[42821]: TrFCTcMiyXmiMjMz8KOD3sNbcQi3LtyaxgYutJThuRcnBmdbcJnl Dec 3 08:04:42 np0005543227 certmonger[42821]: -----END CERTIFICATE----- Dec 3 08:04:42 np0005543227 certmonger[42821]: ". Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Certificate submission still ongoing. Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Certificate submission postprocessing complete. Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Child status = 0. Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Child output: Dec 3 08:04:42 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFYzCCA8ugAwIBAgIBQjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4\nMDQ0MloXDTI3MTIwNDA4MDQ0MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBALpyFXg61ijno4U5kBA/BpAvHwk8q2lHssye\nlJnx+4dLc7ChxZu2tpoHJP6EQAaVGm8JZ018pmGYdOkGDjNxNiry89THNsuw+3CL\nnXgveFFWlHqI5Cg4aPBUBGaU188/WeOLfj9Qr8TqDgKiQ8ypXbfLgCsbBTqJXB6k\n7X3qeX5WBR3FTARKxt0xEbJNFFAMUPzB1linKLSgEEpNpOANMuNbtRq5+p6Sr3hs\nqK4Sm/V23WjPNxf0UebH6QX1+qU4PiVj5reYrA8Ecs/R65JbFdgdG7mUEirUmCTV\nuzLX0MzVL5nbf0BlmnUemNTh1h8/i7BxJ6D3q9hep9/6YUyrpk8CAwEAAaOCAfQw\nggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFItBHx52wHQLTBGEP0qJ7ppD\n2S8mMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u\ndGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTU0MzIyNy5p\nbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P\nTy5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTU0MzIyNy5p\nbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAF2wl9UdMPccv\nZJD/HocVvZTTNwyFObbcfFblPcvaxnauUihobbGPkOHZGG5TaEeczTPlE+wr+I9W\nHS94B3iKSc/nX8eaImNhrr1M0mO8R3TXImvy7LwPyUSvX7L9jVecvPVqDxKrlJaB\n/oGwpVPenoJ7fYSkV9hnsnzF5HFHZ2cHZvhWK7z7acPWCaXwXZ1C0qBzP1CB2+eA\nFUkykBLKU97L8idh14CdNO0DF3KfWXVfC14WUt9LgPRUM53OkX2Mu2z1BXZp9MTp\nfpyJv57QCzwyg7IbON9IaXKJDg4+RV29L6LUhI8ZhBWSDI4x3H9cwOmwJwdWImZu\nqFzyWtmIGW4HPcsj6wzTsm236X+LcLGH9ASaMVCWxX1tEdbBMyfki+31JnrNiSPn\nyQqxa4BQQlJSSZ9gWiygMhz0hTKN55soqp16Gg1ieQNeWNuotAMBOQU0LdUVNvEg\nTrFCTcMiyXmiMjMz8KOD3sNbcQi3LtyaxgYutJThuRcnBmdbcJnl\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:04:42 np0005543227 certmonger[38965]: " Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:04:42 np0005543227 certmonger[38965]: MIIFYzCCA8ugAwIBAgIBQjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:42 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:42 np0005543227 certmonger[38965]: MDQ0MloXDTI3MTIwNDA4MDQ0MlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:42 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:42 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBALpyFXg61ijno4U5kBA/BpAvHwk8q2lHssye Dec 3 08:04:42 np0005543227 certmonger[38965]: lJnx+4dLc7ChxZu2tpoHJP6EQAaVGm8JZ018pmGYdOkGDjNxNiry89THNsuw+3CL Dec 3 08:04:42 np0005543227 certmonger[38965]: nXgveFFWlHqI5Cg4aPBUBGaU188/WeOLfj9Qr8TqDgKiQ8ypXbfLgCsbBTqJXB6k Dec 3 08:04:42 np0005543227 certmonger[38965]: 7X3qeX5WBR3FTARKxt0xEbJNFFAMUPzB1linKLSgEEpNpOANMuNbtRq5+p6Sr3hs Dec 3 08:04:42 np0005543227 certmonger[38965]: qK4Sm/V23WjPNxf0UebH6QX1+qU4PiVj5reYrA8Ecs/R65JbFdgdG7mUEirUmCTV Dec 3 08:04:42 np0005543227 certmonger[38965]: uzLX0MzVL5nbf0BlmnUemNTh1h8/i7BxJ6D3q9hep9/6YUyrpk8CAwEAAaOCAfQw Dec 3 08:04:42 np0005543227 certmonger[38965]: ggHwMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:42 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:42 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:42 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:42 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:42 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFItBHx52wHQLTBGEP0qJ7ppD Dec 3 08:04:42 np0005543227 certmonger[38965]: 2S8mMIHNBgNVHREEgcUwgcKCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:42 np0005543227 certmonger[38965]: dGVzdKBGBgorBgEEAYI3FAIDoDgMNm5vdm5jLXByb3h5L25wMDAwNTU0MzIyNy5p Dec 3 08:04:42 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBVBgYrBgEFAgKgSzBJoAobCE9P Dec 3 08:04:42 np0005543227 certmonger[38965]: Ty5URVNUoTswOaADAgEBoTIwMBsLbm92bmMtcHJveHkbIW5wMDAwNTU0MzIyNy5p Dec 3 08:04:42 np0005543227 certmonger[38965]: bnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAF2wl9UdMPccv Dec 3 08:04:42 np0005543227 certmonger[38965]: ZJD/HocVvZTTNwyFObbcfFblPcvaxnauUihobbGPkOHZGG5TaEeczTPlE+wr+I9W Dec 3 08:04:42 np0005543227 certmonger[38965]: HS94B3iKSc/nX8eaImNhrr1M0mO8R3TXImvy7LwPyUSvX7L9jVecvPVqDxKrlJaB Dec 3 08:04:42 np0005543227 certmonger[38965]: /oGwpVPenoJ7fYSkV9hnsnzF5HFHZ2cHZvhWK7z7acPWCaXwXZ1C0qBzP1CB2+eA Dec 3 08:04:42 np0005543227 certmonger[38965]: FUkykBLKU97L8idh14CdNO0DF3KfWXVfC14WUt9LgPRUM53OkX2Mu2z1BXZp9MTp Dec 3 08:04:42 np0005543227 certmonger[38965]: fpyJv57QCzwyg7IbON9IaXKJDg4+RV29L6LUhI8ZhBWSDI4x3H9cwOmwJwdWImZu Dec 3 08:04:42 np0005543227 certmonger[38965]: qFzyWtmIGW4HPcsj6wzTsm236X+LcLGH9ASaMVCWxX1tEdbBMyfki+31JnrNiSPn Dec 3 08:04:42 np0005543227 certmonger[38965]: yQqxa4BQQlJSSZ9gWiygMhz0hTKN55soqp16Gg1ieQNeWNuotAMBOQU0LdUVNvEg Dec 3 08:04:42 np0005543227 certmonger[38965]: TrFCTcMiyXmiMjMz8KOD3sNbcQi3LtyaxgYutJThuRcnBmdbcJnl Dec 3 08:04:42 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:42 np0005543227 certmonger[38965]: ". Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] No hooks set for pre-save command. Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:42 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:42 np0005543227 certmonger[42899]: Certificate in file "/etc/pki/tls/certs/novnc-proxy.crt" issued by CA and saved. Dec 3 08:04:42 np0005543227 certmonger[38965]: 2025-12-03 08:04:42 [38965] Wrote to /var/lib/certmonger/requests/20251203080442 Dec 3 08:04:43 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:04:44 np0005543227 python3[42915]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:04:45 np0005543227 python3[42935]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:48 np0005543227 python3[42952]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:04:51 np0005543227 python3[42969]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:51 np0005543227 python3[42985]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:04:52 np0005543227 python3[43001]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:04:53 np0005543227 python3[43019]: ansible-certificate_request Invoked with name=ovn_dbs dns=['np0005543227.internalapi.ooo.test'] principal=['ovn_dbs/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:04:54 np0005543227 certmonger[43029]: " for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_dbs/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:04:54 np0005543227 certmonger[43029]: " for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:04:54 np0005543227 certmonger[43029]: MIID2DCCAsACAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:04:54 np0005543227 certmonger[43029]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArSbb93ih Dec 3 08:04:54 np0005543227 certmonger[43029]: S3g78jtoWG1pYkeLzDC5G7x9vRx6bJnI13LnI/PwlWhpbJmS4+uxbkHqooo5YkqR Dec 3 08:04:54 np0005543227 certmonger[43029]: 6oi12NxIcUa3WWrKqN4xGWbI43bt/aWHqCqi11hTiz3a2vRJ3Bg4z8argC5an+RM Dec 3 08:04:54 np0005543227 certmonger[43029]: xUH3g6GjH3UlBFdwghj3bPHIci/9BV7ajHQ97D6GTW0kF7K0zgxL6xDi+GJbD/+5 Dec 3 08:04:54 np0005543227 certmonger[43029]: UM6qT4DgndKv7I+D+MX3qIsHVjbuDTOjRAgsf0wAfUpWdYxx3Iuto+L1g3JLDdkG Dec 3 08:04:54 np0005543227 certmonger[43029]: g9QKZsjDu2ZrAJjLDbDahhvt08eoOkKvXqQ0eg7Q8vBVHLMVu/iWcXDLWp+4gcsD Dec 3 08:04:54 np0005543227 certmonger[43029]: oHwQu4kihCaJbwIDAQABoIIBZTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:04:54 np0005543227 certmonger[43029]: ADAAMwAwADgAMAA0ADUANDCCATQGCSqGSIb3DQEJDjGCASUwggEhMAsGA1UdDwQE Dec 3 08:04:54 np0005543227 certmonger[43029]: AwIFoDCBxQYDVR0RBIG9MIG6giFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:04:54 np0005543227 certmonger[43029]: LnRlc3SgQgYKKwYBBAGCNxQCA6A0DDJvdm5fZGJzL25wMDAwNTU0MzIyNy5pbnRl Dec 3 08:04:54 np0005543227 certmonger[43029]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBRBgYrBgEFAgKgRzBFoAobCE9PTy5U Dec 3 08:04:54 np0005543227 certmonger[43029]: RVNUoTcwNaADAgEBoS4wLBsHb3ZuX2RicxshbnAwMDA1NTQzMjI3LmludGVybmFs Dec 3 08:04:54 np0005543227 certmonger[43029]: YXBpLm9vby50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNV Dec 3 08:04:54 np0005543227 certmonger[43029]: HRMBAf8EAjAAMB0GA1UdDgQWBBQRmKhd5C1DIuwbiGYL6puOgzohtDANBgkqhkiG Dec 3 08:04:54 np0005543227 certmonger[43029]: 9w0BAQsFAAOCAQEAV2f0ws53yd6UPS7R/K56IRjmcQdH+1+f3Qb/3OrwMmPjpl+P Dec 3 08:04:54 np0005543227 certmonger[43029]: QBJepd1U9kc3125j528afhtpWOPRseHome5y/B1IRup7t3tgLOCnT3dYhYZXC5TF Dec 3 08:04:54 np0005543227 certmonger[43029]: FqpGDy9LuzhaD/LVWBGoo4Yx+Y8nSxKLp8s1Hfy5tNw7LI555jFKkOvA50LM+m84 Dec 3 08:04:54 np0005543227 certmonger[43029]: yJi9wFuArBHrlYsDGhyqR2UJtdVtSzWdyMFfNibRHkDIditdqge/Hu2QoH5yGhEO Dec 3 08:04:54 np0005543227 certmonger[43029]: 3LyrqllebNUQZ26yZAL+Oxu6sfKntrDlB8QPnSEkpsHlGErSLJ0pUtBhmQJ/46Ef Dec 3 08:04:54 np0005543227 certmonger[43029]: xG7ThQ3gTMat2u2s8G0r/BxGpO1yRtYB1vuhWw== Dec 3 08:04:54 np0005543227 certmonger[43029]: -----END CERTIFICATE REQUEST----- Dec 3 08:04:54 np0005543227 certmonger[43029]: " for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArSbb93ihS3g78jtoWG1pYkeLzDC5G7x9vRx6bJnI13LnI/PwlWhpbJmS4+uxbkHqooo5YkqR6oi12NxIcUa3WWrKqN4xGWbI43bt/aWHqCqi11hTiz3a2vRJ3Bg4z8argC5an+RMxUH3g6GjH3UlBFdwghj3bPHIci/9BV7ajHQ97D6GTW0kF7K0zgxL6xDi+GJbD/+5UM6qT4DgndKv7I+D+MX3qIsHVjbuDTOjRAgsf0wAfUpWdYxx3Iuto+L1g3JLDdkGg9QKZsjDu2ZrAJjLDbDahhvt08eoOkKvXqQ0eg7Q8vBVHLMVu/iWcXDLWp+4gcsDoHwQu4kihCaJbwIDAQAB" for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:54 np0005543227 certmonger[43029]: 2025-12-03 08:04:54 [43029] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[43029]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:04:54 np0005543227 certmonger[43029]: Certificate: "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" Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Certificate submission still ongoing. Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Certificate submission attempt complete. Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Child status = 0. Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Child output: Dec 3 08:04:54 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:04:54 np0005543227 certmonger[38965]: MIIFWzCCA8OgAwIBAgIBRDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:54 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:54 np0005543227 certmonger[38965]: MDQ1NFoXDTI3MTIwNDA4MDQ1NFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:54 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:54 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAK0m2/d4oUt4O/I7aFhtaWJHi8wwuRu8fb0c Dec 3 08:04:54 np0005543227 certmonger[38965]: emyZyNdy5yPz8JVoaWyZkuPrsW5B6qKKOWJKkeqItdjcSHFGt1lqyqjeMRlmyON2 Dec 3 08:04:54 np0005543227 certmonger[38965]: 7f2lh6gqotdYU4s92tr0SdwYOM/Gq4AuWp/kTMVB94Ohox91JQRXcIIY92zxyHIv Dec 3 08:04:54 np0005543227 certmonger[38965]: /QVe2ox0Pew+hk1tJBeytM4MS+sQ4vhiWw//uVDOqk+A4J3Sr+yPg/jF96iLB1Y2 Dec 3 08:04:54 np0005543227 certmonger[38965]: 7g0zo0QILH9MAH1KVnWMcdyLraPi9YNySw3ZBoPUCmbIw7tmawCYyw2w2oYb7dPH Dec 3 08:04:54 np0005543227 certmonger[38965]: qDpCr16kNHoO0PLwVRyzFbv4lnFwy1qfuIHLA6B8ELuJIoQmiW8CAwEAAaOCAeww Dec 3 08:04:54 np0005543227 certmonger[38965]: ggHoMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:54 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:54 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:54 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:54 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:54 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCMghQhoTb6OJt7oj0bUR+08 Dec 3 08:04:54 np0005543227 certmonger[38965]: lXMwMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:54 np0005543227 certmonger[38965]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NTQzMjI3LmludGVy Dec 3 08:04:54 np0005543227 certmonger[38965]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Dec 3 08:04:54 np0005543227 certmonger[38965]: U1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1NDMyMjcuaW50ZXJuYWxh Dec 3 08:04:54 np0005543227 certmonger[38965]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAD2JXgTDHPrsb9Eoto78yrbh Dec 3 08:04:54 np0005543227 certmonger[38965]: ylFp8QjowHBbDZpyGn4mOCNJcUphfDCHz6BkSx71JdRjZNl693rG8dEOvK+qn8cZ Dec 3 08:04:54 np0005543227 certmonger[38965]: ASVj6emNp1Q2EfS2ka7WXxanHMaIwVytVbLARuK11dGzSx51kjnsVTnWbF1ua8oZ Dec 3 08:04:54 np0005543227 certmonger[38965]: OyDRgIuOSR9tQ3oSyMRBlVCNznQePO75rbJ2rwvK+1wkS6JmR+0/tm+cb9M5h/Mo Dec 3 08:04:54 np0005543227 certmonger[38965]: fSOiw1JVons0zUw93MVMaZ41QU9BqSTPNvISZSoPy6Gv6khwGDIiP2T8Re6W8wx0 Dec 3 08:04:54 np0005543227 certmonger[38965]: iFZRwqkVZvdSUtwZjQ8ECTTP2p8dn7OQJOrvKLC8tSvX8r+Azkpxom8f2rbYx1E9 Dec 3 08:04:54 np0005543227 certmonger[38965]: /IPdVJFGuGMDL3Ybo6jKNDlpz9//KaW7+VgEcdgYNLben+qzU46rwVjLpkWzAnQC Dec 3 08:04:54 np0005543227 certmonger[38965]: W2LEDLvElCREMY9EcVdF6w0qBiqfjAHaKz9HWwSVDI2faO8PJyvC96+Sra9eCCnq Dec 3 08:04:54 np0005543227 certmonger[38965]: pJVcK1SqF64orDFCQtovCg6fdI9GWt22aVqUJeG7dg== Dec 3 08:04:54 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:54 np0005543227 certmonger[38965]: " Dec 3 08:04:54 np0005543227 certmonger[43031]: 2025-12-03 08:04:54 [43031] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:04:54 np0005543227 certmonger[43031]: MIIFWzCCA8OgAwIBAgIBRDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:54 np0005543227 certmonger[43031]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:54 np0005543227 certmonger[43031]: MDQ1NFoXDTI3MTIwNDA4MDQ1NFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:54 np0005543227 certmonger[43031]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:54 np0005543227 certmonger[43031]: hvcNAQEBBQADggEPADCCAQoCggEBAK0m2/d4oUt4O/I7aFhtaWJHi8wwuRu8fb0c Dec 3 08:04:54 np0005543227 certmonger[43031]: emyZyNdy5yPz8JVoaWyZkuPrsW5B6qKKOWJKkeqItdjcSHFGt1lqyqjeMRlmyON2 Dec 3 08:04:54 np0005543227 certmonger[43031]: 7f2lh6gqotdYU4s92tr0SdwYOM/Gq4AuWp/kTMVB94Ohox91JQRXcIIY92zxyHIv Dec 3 08:04:54 np0005543227 certmonger[43031]: /QVe2ox0Pew+hk1tJBeytM4MS+sQ4vhiWw//uVDOqk+A4J3Sr+yPg/jF96iLB1Y2 Dec 3 08:04:54 np0005543227 certmonger[43031]: 7g0zo0QILH9MAH1KVnWMcdyLraPi9YNySw3ZBoPUCmbIw7tmawCYyw2w2oYb7dPH Dec 3 08:04:54 np0005543227 certmonger[43031]: qDpCr16kNHoO0PLwVRyzFbv4lnFwy1qfuIHLA6B8ELuJIoQmiW8CAwEAAaOCAeww Dec 3 08:04:54 np0005543227 certmonger[43031]: ggHoMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:54 np0005543227 certmonger[43031]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:54 np0005543227 certmonger[43031]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:54 np0005543227 certmonger[43031]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:54 np0005543227 certmonger[43031]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:54 np0005543227 certmonger[43031]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCMghQhoTb6OJt7oj0bUR+08 Dec 3 08:04:54 np0005543227 certmonger[43031]: lXMwMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:54 np0005543227 certmonger[43031]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NTQzMjI3LmludGVy Dec 3 08:04:54 np0005543227 certmonger[43031]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Dec 3 08:04:54 np0005543227 certmonger[43031]: U1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1NDMyMjcuaW50ZXJuYWxh Dec 3 08:04:54 np0005543227 certmonger[43031]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAD2JXgTDHPrsb9Eoto78yrbh Dec 3 08:04:54 np0005543227 certmonger[43031]: ylFp8QjowHBbDZpyGn4mOCNJcUphfDCHz6BkSx71JdRjZNl693rG8dEOvK+qn8cZ Dec 3 08:04:54 np0005543227 certmonger[43031]: ASVj6emNp1Q2EfS2ka7WXxanHMaIwVytVbLARuK11dGzSx51kjnsVTnWbF1ua8oZ Dec 3 08:04:54 np0005543227 certmonger[43031]: OyDRgIuOSR9tQ3oSyMRBlVCNznQePO75rbJ2rwvK+1wkS6JmR+0/tm+cb9M5h/Mo Dec 3 08:04:54 np0005543227 certmonger[43031]: fSOiw1JVons0zUw93MVMaZ41QU9BqSTPNvISZSoPy6Gv6khwGDIiP2T8Re6W8wx0 Dec 3 08:04:54 np0005543227 certmonger[43031]: iFZRwqkVZvdSUtwZjQ8ECTTP2p8dn7OQJOrvKLC8tSvX8r+Azkpxom8f2rbYx1E9 Dec 3 08:04:54 np0005543227 certmonger[43031]: /IPdVJFGuGMDL3Ybo6jKNDlpz9//KaW7+VgEcdgYNLben+qzU46rwVjLpkWzAnQC Dec 3 08:04:54 np0005543227 certmonger[43031]: W2LEDLvElCREMY9EcVdF6w0qBiqfjAHaKz9HWwSVDI2faO8PJyvC96+Sra9eCCnq Dec 3 08:04:54 np0005543227 certmonger[43031]: pJVcK1SqF64orDFCQtovCg6fdI9GWt22aVqUJeG7dg== Dec 3 08:04:54 np0005543227 certmonger[43031]: -----END CERTIFICATE----- Dec 3 08:04:54 np0005543227 certmonger[43031]: ". Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Certificate submission still ongoing. Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Certificate submission postprocessing complete. Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Child status = 0. Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Child output: Dec 3 08:04:54 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFWzCCA8OgAwIBAgIBRDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4\nMDQ1NFoXDTI3MTIwNDA4MDQ1NFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBAK0m2/d4oUt4O/I7aFhtaWJHi8wwuRu8fb0c\nemyZyNdy5yPz8JVoaWyZkuPrsW5B6qKKOWJKkeqItdjcSHFGt1lqyqjeMRlmyON2\n7f2lh6gqotdYU4s92tr0SdwYOM/Gq4AuWp/kTMVB94Ohox91JQRXcIIY92zxyHIv\n/QVe2ox0Pew+hk1tJBeytM4MS+sQ4vhiWw//uVDOqk+A4J3Sr+yPg/jF96iLB1Y2\n7g0zo0QILH9MAH1KVnWMcdyLraPi9YNySw3ZBoPUCmbIw7tmawCYyw2w2oYb7dPH\nqDpCr16kNHoO0PLwVRyzFbv4lnFwy1qfuIHLA6B8ELuJIoQmiW8CAwEAAaOCAeww\nggHoMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCMghQhoTb6OJt7oj0bUR+08\nlXMwMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u\ndGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NTQzMjI3LmludGVy\nbmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF\nU1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1NDMyMjcuaW50ZXJuYWxh\ncGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAD2JXgTDHPrsb9Eoto78yrbh\nylFp8QjowHBbDZpyGn4mOCNJcUphfDCHz6BkSx71JdRjZNl693rG8dEOvK+qn8cZ\nASVj6emNp1Q2EfS2ka7WXxanHMaIwVytVbLARuK11dGzSx51kjnsVTnWbF1ua8oZ\nOyDRgIuOSR9tQ3oSyMRBlVCNznQePO75rbJ2rwvK+1wkS6JmR+0/tm+cb9M5h/Mo\nfSOiw1JVons0zUw93MVMaZ41QU9BqSTPNvISZSoPy6Gv6khwGDIiP2T8Re6W8wx0\niFZRwqkVZvdSUtwZjQ8ECTTP2p8dn7OQJOrvKLC8tSvX8r+Azkpxom8f2rbYx1E9\n/IPdVJFGuGMDL3Ybo6jKNDlpz9//KaW7+VgEcdgYNLben+qzU46rwVjLpkWzAnQC\nW2LEDLvElCREMY9EcVdF6w0qBiqfjAHaKz9HWwSVDI2faO8PJyvC96+Sra9eCCnq\npJVcK1SqF64orDFCQtovCg6fdI9GWt22aVqUJeG7dg==\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:04:54 np0005543227 certmonger[38965]: " Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:04:54 np0005543227 certmonger[38965]: MIIFWzCCA8OgAwIBAgIBRDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:04:54 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:04:54 np0005543227 certmonger[38965]: MDQ1NFoXDTI3MTIwNDA4MDQ1NFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:04:54 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:04:54 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAK0m2/d4oUt4O/I7aFhtaWJHi8wwuRu8fb0c Dec 3 08:04:54 np0005543227 certmonger[38965]: emyZyNdy5yPz8JVoaWyZkuPrsW5B6qKKOWJKkeqItdjcSHFGt1lqyqjeMRlmyON2 Dec 3 08:04:54 np0005543227 certmonger[38965]: 7f2lh6gqotdYU4s92tr0SdwYOM/Gq4AuWp/kTMVB94Ohox91JQRXcIIY92zxyHIv Dec 3 08:04:54 np0005543227 certmonger[38965]: /QVe2ox0Pew+hk1tJBeytM4MS+sQ4vhiWw//uVDOqk+A4J3Sr+yPg/jF96iLB1Y2 Dec 3 08:04:54 np0005543227 certmonger[38965]: 7g0zo0QILH9MAH1KVnWMcdyLraPi9YNySw3ZBoPUCmbIw7tmawCYyw2w2oYb7dPH Dec 3 08:04:54 np0005543227 certmonger[38965]: qDpCr16kNHoO0PLwVRyzFbv4lnFwy1qfuIHLA6B8ELuJIoQmiW8CAwEAAaOCAeww Dec 3 08:04:54 np0005543227 certmonger[38965]: ggHoMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:04:54 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:04:54 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:04:54 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:04:54 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:04:54 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFCMghQhoTb6OJt7oj0bUR+08 Dec 3 08:04:54 np0005543227 certmonger[38965]: lXMwMIHFBgNVHREEgb0wgbqCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:04:54 np0005543227 certmonger[38965]: dGVzdKBCBgorBgEEAYI3FAIDoDQMMm92bl9kYnMvbnAwMDA1NTQzMjI3LmludGVy Dec 3 08:04:54 np0005543227 certmonger[38965]: bmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoFEGBisGAQUCAqBHMEWgChsIT09PLlRF Dec 3 08:04:54 np0005543227 certmonger[38965]: U1ShNzA1oAMCAQGhLjAsGwdvdm5fZGJzGyFucDAwMDU1NDMyMjcuaW50ZXJuYWxh Dec 3 08:04:54 np0005543227 certmonger[38965]: cGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAD2JXgTDHPrsb9Eoto78yrbh Dec 3 08:04:54 np0005543227 certmonger[38965]: ylFp8QjowHBbDZpyGn4mOCNJcUphfDCHz6BkSx71JdRjZNl693rG8dEOvK+qn8cZ Dec 3 08:04:54 np0005543227 certmonger[38965]: ASVj6emNp1Q2EfS2ka7WXxanHMaIwVytVbLARuK11dGzSx51kjnsVTnWbF1ua8oZ Dec 3 08:04:54 np0005543227 certmonger[38965]: OyDRgIuOSR9tQ3oSyMRBlVCNznQePO75rbJ2rwvK+1wkS6JmR+0/tm+cb9M5h/Mo Dec 3 08:04:54 np0005543227 certmonger[38965]: fSOiw1JVons0zUw93MVMaZ41QU9BqSTPNvISZSoPy6Gv6khwGDIiP2T8Re6W8wx0 Dec 3 08:04:54 np0005543227 certmonger[38965]: iFZRwqkVZvdSUtwZjQ8ECTTP2p8dn7OQJOrvKLC8tSvX8r+Azkpxom8f2rbYx1E9 Dec 3 08:04:54 np0005543227 certmonger[38965]: /IPdVJFGuGMDL3Ybo6jKNDlpz9//KaW7+VgEcdgYNLben+qzU46rwVjLpkWzAnQC Dec 3 08:04:54 np0005543227 certmonger[38965]: W2LEDLvElCREMY9EcVdF6w0qBiqfjAHaKz9HWwSVDI2faO8PJyvC96+Sra9eCCnq Dec 3 08:04:54 np0005543227 certmonger[38965]: pJVcK1SqF64orDFCQtovCg6fdI9GWt22aVqUJeG7dg== Dec 3 08:04:54 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:04:54 np0005543227 certmonger[38965]: ". Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] No hooks set for pre-save command. Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] No hooks set for post-save command. Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:54 np0005543227 certmonger[43035]: Certificate in file "/etc/pki/tls/certs/ovn_dbs.crt" issued by CA and saved. Dec 3 08:04:54 np0005543227 certmonger[38965]: 2025-12-03 08:04:54 [38965] Wrote to /var/lib/certmonger/requests/20251203080454 Dec 3 08:04:55 np0005543227 python3[43051]: ansible-ansible.builtin.file Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig recurse=True state=directory selevel=s0 setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 08:04:55 np0005543227 python3[43067]: ansible-ansible.legacy.command Invoked with _raw_params=ovsdb-tool --help|grep -q election-timer _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:04:56 np0005543227 python3[43118]: ansible-ansible.legacy.stat Invoked with path=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 08:04:57 np0005543227 python3[43161]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764749096.1432815-111071-223310282541919/source dest=/var/lib/config-data/ansible-generated/ovn/etc/sysconfig/ovn_cluster mode=640 selevel=s0 setype=container_file_t follow=False _original_basename=ovn_cluster.j2 checksum=4974a1f6921c04920e9a65c28a143e531c1e7336 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None attributes=None Dec 3 08:04:57 np0005543227 python3[43191]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_north_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:04:58 np0005543227 python3[43208]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_south_db_server _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:04:58 np0005543227 python3[43225]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active --quiet tripleo_cluster_northd _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:04:59 np0005543227 python3[43242]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:05:00 np0005543227 python3[43262]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:05:03 np0005543227 python3[43279]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:05:06 np0005543227 python3[43296]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:05:06 np0005543227 python3[43312]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:05:07 np0005543227 python3[43328]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:05:08 np0005543227 python3[43346]: ansible-certificate_request Invoked with name=ovn_controller dns=['np0005543227.internalapi.ooo.test'] principal=['ovn_controller/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None run_after=None Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:05:09 np0005543227 certmonger[43356]: " for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_REQ_PRINCIPAL" to "ovn_controller/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:05:09 np0005543227 certmonger[43356]: " for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:05:09 np0005543227 certmonger[43356]: MIID5jCCAs4CAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:05:09 np0005543227 certmonger[43356]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzg0/6vV Dec 3 08:05:09 np0005543227 certmonger[43356]: VuqemfYhhPzs0mxIthnxvazgtm+AG1Sx1tuS1gRv3H4ulLokh0U6HVGi9WeifB0b Dec 3 08:05:09 np0005543227 certmonger[43356]: uzHIha4AsUDjQuBm4SLEqwUYGsAKxWyXKpLlLJtAAjRWxe9T0EpV7XYMqR33UYRI Dec 3 08:05:09 np0005543227 certmonger[43356]: aPnHcrc+DuXGDKtk6/4IkFbLNq06YWhzDfODrHen7/P1b2/p1Gg9MySuHwvpKnG+ Dec 3 08:05:09 np0005543227 certmonger[43356]: UOA7s7U6VYoRaPQPjHKtea/kPIs98B8999LC27W76eWfOpqgrnDruruQlRJBhAXy Dec 3 08:05:09 np0005543227 certmonger[43356]: ao1GTHIpwYKNiyHsf3bOEu8/7yZ2IOLEKwUZAjZF4QjXxLOV6iMUFVwgMZv2pQGU Dec 3 08:05:09 np0005543227 certmonger[43356]: gzWbXkIWYeDQUwIDAQABoIIBczArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:05:09 np0005543227 certmonger[43356]: ADAAMwAwADgAMAA1ADAAOTCCAUIGCSqGSIb3DQEJDjGCATMwggEvMAsGA1UdDwQE Dec 3 08:05:09 np0005543227 certmonger[43356]: AwIFoDCB0wYDVR0RBIHLMIHIgiFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:05:09 np0005543227 certmonger[43356]: LnRlc3SgSQYKKwYBBAGCNxQCA6A7DDlvdm5fY29udHJvbGxlci9ucDAwMDU1NDMy Dec 3 08:05:09 np0005543227 certmonger[43356]: MjcuaW50ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgWAYGKwYBBQICoE4wTKAK Dec 3 08:05:09 np0005543227 certmonger[43356]: GwhPT08uVEVTVKE+MDygAwIBAaE1MDMbDm92bl9jb250cm9sbGVyGyFucDAwMDU1 Dec 3 08:05:09 np0005543227 certmonger[43356]: NDMyMjcuaW50ZXJuYWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEG Dec 3 08:05:09 np0005543227 certmonger[43356]: CCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFBGYqF3kLUMi7BuIZgvq Dec 3 08:05:09 np0005543227 certmonger[43356]: m46DOiG0MA0GCSqGSIb3DQEBCwUAA4IBAQBnKP1VmswfG2iSguK2dNthMx4uVSZa Dec 3 08:05:09 np0005543227 certmonger[43356]: jlsmR+FVmIgXJQ7zb+fjFtSNZu9VKg/on5P47d2OpsO5kdfQDt1UedHu1wgwcFo9 Dec 3 08:05:09 np0005543227 certmonger[43356]: iALJwLz8I+e1ye0UWMOSjUJ70CwNlUw/3FF0Rsf1T9Nn7eq8V197AQLgzom4xwI3 Dec 3 08:05:09 np0005543227 certmonger[43356]: oZRCfaar0dO5UJcImiVhK8rYWpllCSMiOvProEv9vQbD3y+0zrKuT5a/+GaGcWRZ Dec 3 08:05:09 np0005543227 certmonger[43356]: wIWV1jSrIl8K0JbGmCHxq5woCbqtkXOfhZ4/Wf9hldZbTQiLDAu+2C9ODqMMRIv/ Dec 3 08:05:09 np0005543227 certmonger[43356]: ztb5xxEsUhiKJxEjkZoCm5jRT9nBwsZkPHTHBdB3xFabSuAZWP88ikfD Dec 3 08:05:09 np0005543227 certmonger[43356]: -----END CERTIFICATE REQUEST----- Dec 3 08:05:09 np0005543227 certmonger[43356]: " for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzg0/6vVVuqemfYhhPzs0mxIthnxvazgtm+AG1Sx1tuS1gRv3H4ulLokh0U6HVGi9WeifB0buzHIha4AsUDjQuBm4SLEqwUYGsAKxWyXKpLlLJtAAjRWxe9T0EpV7XYMqR33UYRIaPnHcrc+DuXGDKtk6/4IkFbLNq06YWhzDfODrHen7/P1b2/p1Gg9MySuHwvpKnG+UOA7s7U6VYoRaPQPjHKtea/kPIs98B8999LC27W76eWfOpqgrnDruruQlRJBhAXyao1GTHIpwYKNiyHsf3bOEu8/7yZ2IOLEKwUZAjZF4QjXxLOV6iMUFVwgMZv2pQGUgzWbXkIWYeDQUwIDAQAB" for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:05:09 np0005543227 certmonger[43356]: 2025-12-03 08:05:09 [43356] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[43356]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:05:09 np0005543227 certmonger[43356]: Certificate: "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" Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Certificate submission still ongoing. Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Certificate submission attempt complete. Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Child status = 0. Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Child output: Dec 3 08:05:09 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:05:09 np0005543227 certmonger[38965]: MIIFaTCCA9GgAwIBAgIBRjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:09 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:09 np0005543227 certmonger[38965]: MDUwOVoXDTI3MTIwNDA4MDUwOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:09 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:09 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBALs4NP+r1Vbqnpn2IYT87NJsSLYZ8b2s4LZv Dec 3 08:05:09 np0005543227 certmonger[38965]: gBtUsdbbktYEb9x+LpS6JIdFOh1RovVnonwdG7sxyIWuALFA40LgZuEixKsFGBrA Dec 3 08:05:09 np0005543227 certmonger[38965]: CsVslyqS5SybQAI0VsXvU9BKVe12DKkd91GESGj5x3K3Pg7lxgyrZOv+CJBWyzat Dec 3 08:05:09 np0005543227 certmonger[38965]: OmFocw3zg6x3p+/z9W9v6dRoPTMkrh8L6SpxvlDgO7O1OlWKEWj0D4xyrXmv5DyL Dec 3 08:05:09 np0005543227 certmonger[38965]: PfAfPffSwtu1u+nlnzqaoK5w67q7kJUSQYQF8mqNRkxyKcGCjYsh7H92zhLvP+8m Dec 3 08:05:09 np0005543227 certmonger[38965]: diDixCsFGQI2ReEI18SzleojFBVcIDGb9qUBlIM1m15CFmHg0FMCAwEAAaOCAfow Dec 3 08:05:09 np0005543227 certmonger[38965]: ggH2MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:09 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:09 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:09 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:09 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:09 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMlPjARJeEbWgvMtmCHi6DwO Dec 3 08:05:09 np0005543227 certmonger[38965]: 4G0YMIHTBgNVHREEgcswgciCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:09 np0005543227 certmonger[38965]: dGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTU0MzIy Dec 3 08:05:09 np0005543227 certmonger[38965]: Ny5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob Dec 3 08:05:09 np0005543227 certmonger[38965]: CE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTU0 Dec 3 08:05:09 np0005543227 certmonger[38965]: MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEANaPp Dec 3 08:05:09 np0005543227 certmonger[38965]: /DjiSreLsp4pnvatdlYNCldmXT/4++dEuq4dfJtzGLHSEQddvEjKqgRrSiapODoV Dec 3 08:05:09 np0005543227 certmonger[38965]: 8s3njjY29jjNWGKjgF0z7l6U6iJymBuivj2WwSH2Us59Uej53r1ofdxMqNJIqdYa Dec 3 08:05:09 np0005543227 certmonger[38965]: Ec0/yiPympyxderS9Aw+sJGcDsEHU2daBpKiAJ9ZviAo8H9DzNkAkPMiwgni/6Co Dec 3 08:05:09 np0005543227 certmonger[38965]: hZkKUwWv36ik8PYl/v/e8E7YNAvomHu/SGW53b6hNXuZB3f2WmJs51U7CPSxlEc0 Dec 3 08:05:09 np0005543227 certmonger[38965]: o5d9fH6Yyy9uV04hv4RrIuFltcsUezdpOwbmG0zhf2yCodVyw3kwadAHm5HF0f5F Dec 3 08:05:09 np0005543227 certmonger[38965]: W2PiZU5+n1CwXJ7ztxpOMxRUqv0S4HciUTkw0SrFacj+g2hIG2tS9G4RTOvelxpk Dec 3 08:05:09 np0005543227 certmonger[38965]: DoWlSeBmSbpBnwEFog/SD9My7BsgTOqptZxWNZt4zZYo9lXAaub/iPPvCR9bqteo Dec 3 08:05:09 np0005543227 certmonger[38965]: nzk6GsVInojZskX6wh5SJC3PKVXTOdPCHaDzPrVr1NySLDQQJn4miwD/4jnK Dec 3 08:05:09 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:05:09 np0005543227 certmonger[38965]: " Dec 3 08:05:09 np0005543227 certmonger[43358]: 2025-12-03 08:05:09 [43358] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:05:09 np0005543227 certmonger[43358]: MIIFaTCCA9GgAwIBAgIBRjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:09 np0005543227 certmonger[43358]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:09 np0005543227 certmonger[43358]: MDUwOVoXDTI3MTIwNDA4MDUwOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:09 np0005543227 certmonger[43358]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:09 np0005543227 certmonger[43358]: hvcNAQEBBQADggEPADCCAQoCggEBALs4NP+r1Vbqnpn2IYT87NJsSLYZ8b2s4LZv Dec 3 08:05:09 np0005543227 certmonger[43358]: gBtUsdbbktYEb9x+LpS6JIdFOh1RovVnonwdG7sxyIWuALFA40LgZuEixKsFGBrA Dec 3 08:05:09 np0005543227 certmonger[43358]: CsVslyqS5SybQAI0VsXvU9BKVe12DKkd91GESGj5x3K3Pg7lxgyrZOv+CJBWyzat Dec 3 08:05:09 np0005543227 certmonger[43358]: OmFocw3zg6x3p+/z9W9v6dRoPTMkrh8L6SpxvlDgO7O1OlWKEWj0D4xyrXmv5DyL Dec 3 08:05:09 np0005543227 certmonger[43358]: PfAfPffSwtu1u+nlnzqaoK5w67q7kJUSQYQF8mqNRkxyKcGCjYsh7H92zhLvP+8m Dec 3 08:05:09 np0005543227 certmonger[43358]: diDixCsFGQI2ReEI18SzleojFBVcIDGb9qUBlIM1m15CFmHg0FMCAwEAAaOCAfow Dec 3 08:05:09 np0005543227 certmonger[43358]: ggH2MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:09 np0005543227 certmonger[43358]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:09 np0005543227 certmonger[43358]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:09 np0005543227 certmonger[43358]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:09 np0005543227 certmonger[43358]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:09 np0005543227 certmonger[43358]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMlPjARJeEbWgvMtmCHi6DwO Dec 3 08:05:09 np0005543227 certmonger[43358]: 4G0YMIHTBgNVHREEgcswgciCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:09 np0005543227 certmonger[43358]: dGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTU0MzIy Dec 3 08:05:09 np0005543227 certmonger[43358]: Ny5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob Dec 3 08:05:09 np0005543227 certmonger[43358]: CE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTU0 Dec 3 08:05:09 np0005543227 certmonger[43358]: MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEANaPp Dec 3 08:05:09 np0005543227 certmonger[43358]: /DjiSreLsp4pnvatdlYNCldmXT/4++dEuq4dfJtzGLHSEQddvEjKqgRrSiapODoV Dec 3 08:05:09 np0005543227 certmonger[43358]: 8s3njjY29jjNWGKjgF0z7l6U6iJymBuivj2WwSH2Us59Uej53r1ofdxMqNJIqdYa Dec 3 08:05:09 np0005543227 certmonger[43358]: Ec0/yiPympyxderS9Aw+sJGcDsEHU2daBpKiAJ9ZviAo8H9DzNkAkPMiwgni/6Co Dec 3 08:05:09 np0005543227 certmonger[43358]: hZkKUwWv36ik8PYl/v/e8E7YNAvomHu/SGW53b6hNXuZB3f2WmJs51U7CPSxlEc0 Dec 3 08:05:09 np0005543227 certmonger[43358]: o5d9fH6Yyy9uV04hv4RrIuFltcsUezdpOwbmG0zhf2yCodVyw3kwadAHm5HF0f5F Dec 3 08:05:09 np0005543227 certmonger[43358]: W2PiZU5+n1CwXJ7ztxpOMxRUqv0S4HciUTkw0SrFacj+g2hIG2tS9G4RTOvelxpk Dec 3 08:05:09 np0005543227 certmonger[43358]: DoWlSeBmSbpBnwEFog/SD9My7BsgTOqptZxWNZt4zZYo9lXAaub/iPPvCR9bqteo Dec 3 08:05:09 np0005543227 certmonger[43358]: nzk6GsVInojZskX6wh5SJC3PKVXTOdPCHaDzPrVr1NySLDQQJn4miwD/4jnK Dec 3 08:05:09 np0005543227 certmonger[43358]: -----END CERTIFICATE----- Dec 3 08:05:09 np0005543227 certmonger[43358]: ". Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Certificate submission still ongoing. Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Certificate submission postprocessing complete. Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Child status = 0. Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Child output: Dec 3 08:05:09 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFaTCCA9GgAwIBAgIBRjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4\nMDUwOVoXDTI3MTIwNDA4MDUwOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBALs4NP+r1Vbqnpn2IYT87NJsSLYZ8b2s4LZv\ngBtUsdbbktYEb9x+LpS6JIdFOh1RovVnonwdG7sxyIWuALFA40LgZuEixKsFGBrA\nCsVslyqS5SybQAI0VsXvU9BKVe12DKkd91GESGj5x3K3Pg7lxgyrZOv+CJBWyzat\nOmFocw3zg6x3p+/z9W9v6dRoPTMkrh8L6SpxvlDgO7O1OlWKEWj0D4xyrXmv5DyL\nPfAfPffSwtu1u+nlnzqaoK5w67q7kJUSQYQF8mqNRkxyKcGCjYsh7H92zhLvP+8m\ndiDixCsFGQI2ReEI18SzleojFBVcIDGb9qUBlIM1m15CFmHg0FMCAwEAAaOCAfow\nggH2MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMlPjARJeEbWgvMtmCHi6DwO\n4G0YMIHTBgNVHREEgcswgciCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u\ndGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTU0MzIy\nNy5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob\nCE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTU0\nMzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEANaPp\n/DjiSreLsp4pnvatdlYNCldmXT/4++dEuq4dfJtzGLHSEQddvEjKqgRrSiapODoV\n8s3njjY29jjNWGKjgF0z7l6U6iJymBuivj2WwSH2Us59Uej53r1ofdxMqNJIqdYa\nEc0/yiPympyxderS9Aw+sJGcDsEHU2daBpKiAJ9ZviAo8H9DzNkAkPMiwgni/6Co\nhZkKUwWv36ik8PYl/v/e8E7YNAvomHu/SGW53b6hNXuZB3f2WmJs51U7CPSxlEc0\no5d9fH6Yyy9uV04hv4RrIuFltcsUezdpOwbmG0zhf2yCodVyw3kwadAHm5HF0f5F\nW2PiZU5+n1CwXJ7ztxpOMxRUqv0S4HciUTkw0SrFacj+g2hIG2tS9G4RTOvelxpk\nDoWlSeBmSbpBnwEFog/SD9My7BsgTOqptZxWNZt4zZYo9lXAaub/iPPvCR9bqteo\nnzk6GsVInojZskX6wh5SJC3PKVXTOdPCHaDzPrVr1NySLDQQJn4miwD/4jnK\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:05:09 np0005543227 certmonger[38965]: " Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:05:09 np0005543227 certmonger[38965]: MIIFaTCCA9GgAwIBAgIBRjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:09 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:09 np0005543227 certmonger[38965]: MDUwOVoXDTI3MTIwNDA4MDUwOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:09 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:09 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBALs4NP+r1Vbqnpn2IYT87NJsSLYZ8b2s4LZv Dec 3 08:05:09 np0005543227 certmonger[38965]: gBtUsdbbktYEb9x+LpS6JIdFOh1RovVnonwdG7sxyIWuALFA40LgZuEixKsFGBrA Dec 3 08:05:09 np0005543227 certmonger[38965]: CsVslyqS5SybQAI0VsXvU9BKVe12DKkd91GESGj5x3K3Pg7lxgyrZOv+CJBWyzat Dec 3 08:05:09 np0005543227 certmonger[38965]: OmFocw3zg6x3p+/z9W9v6dRoPTMkrh8L6SpxvlDgO7O1OlWKEWj0D4xyrXmv5DyL Dec 3 08:05:09 np0005543227 certmonger[38965]: PfAfPffSwtu1u+nlnzqaoK5w67q7kJUSQYQF8mqNRkxyKcGCjYsh7H92zhLvP+8m Dec 3 08:05:09 np0005543227 certmonger[38965]: diDixCsFGQI2ReEI18SzleojFBVcIDGb9qUBlIM1m15CFmHg0FMCAwEAAaOCAfow Dec 3 08:05:09 np0005543227 certmonger[38965]: ggH2MB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:09 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:09 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:09 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:09 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:09 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFMlPjARJeEbWgvMtmCHi6DwO Dec 3 08:05:09 np0005543227 certmonger[38965]: 4G0YMIHTBgNVHREEgcswgciCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:09 np0005543227 certmonger[38965]: dGVzdKBJBgorBgEEAYI3FAIDoDsMOW92bl9jb250cm9sbGVyL25wMDAwNTU0MzIy Dec 3 08:05:09 np0005543227 certmonger[38965]: Ny5pbnRlcm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBYBgYrBgEFAgKgTjBMoAob Dec 3 08:05:09 np0005543227 certmonger[38965]: CE9PTy5URVNUoT4wPKADAgEBoTUwMxsOb3ZuX2NvbnRyb2xsZXIbIW5wMDAwNTU0 Dec 3 08:05:09 np0005543227 certmonger[38965]: MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEANaPp Dec 3 08:05:09 np0005543227 certmonger[38965]: /DjiSreLsp4pnvatdlYNCldmXT/4++dEuq4dfJtzGLHSEQddvEjKqgRrSiapODoV Dec 3 08:05:09 np0005543227 certmonger[38965]: 8s3njjY29jjNWGKjgF0z7l6U6iJymBuivj2WwSH2Us59Uej53r1ofdxMqNJIqdYa Dec 3 08:05:09 np0005543227 certmonger[38965]: Ec0/yiPympyxderS9Aw+sJGcDsEHU2daBpKiAJ9ZviAo8H9DzNkAkPMiwgni/6Co Dec 3 08:05:09 np0005543227 certmonger[38965]: hZkKUwWv36ik8PYl/v/e8E7YNAvomHu/SGW53b6hNXuZB3f2WmJs51U7CPSxlEc0 Dec 3 08:05:09 np0005543227 certmonger[38965]: o5d9fH6Yyy9uV04hv4RrIuFltcsUezdpOwbmG0zhf2yCodVyw3kwadAHm5HF0f5F Dec 3 08:05:09 np0005543227 certmonger[38965]: W2PiZU5+n1CwXJ7ztxpOMxRUqv0S4HciUTkw0SrFacj+g2hIG2tS9G4RTOvelxpk Dec 3 08:05:09 np0005543227 certmonger[38965]: DoWlSeBmSbpBnwEFog/SD9My7BsgTOqptZxWNZt4zZYo9lXAaub/iPPvCR9bqteo Dec 3 08:05:09 np0005543227 certmonger[38965]: nzk6GsVInojZskX6wh5SJC3PKVXTOdPCHaDzPrVr1NySLDQQJn4miwD/4jnK Dec 3 08:05:09 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:05:09 np0005543227 certmonger[38965]: ". Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] No hooks set for pre-save command. Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] No hooks set for post-save command. Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:09 np0005543227 certmonger[43362]: Certificate in file "/etc/pki/tls/certs/ovn_controller.crt" issued by CA and saved. Dec 3 08:05:09 np0005543227 certmonger[38965]: 2025-12-03 08:05:09 [38965] Wrote to /var/lib/certmonger/requests/20251203080509 Dec 3 08:05:10 np0005543227 python3[43378]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:05:11 np0005543227 python3[43398]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:05:14 np0005543227 python3[43415]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:05:17 np0005543227 python3[43432]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:05:17 np0005543227 python3[43448]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:05:17 np0005543227 python3[43464]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:05:18 np0005543227 python3[43482]: ansible-certificate_request Invoked with name=rabbitmq dns=['np0005543227.internalapi.ooo.test'] principal=['rabbitmq/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'rabbitmq(-bundle-.*-[0-9]+)?')#012service_crt="/etc/pki/tls/certs/rabbitmq.crt"#012service_key="/etc/pki/tls/private/rabbitmq.key"#012if echo "$container_name" | grep -q "^rabbitmq-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_crt" "$service_key" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the cert at the mount-point#012 podman cp $service_crt "$container_name:/var/lib/kolla/config_files/src-tls/$service_crt"#012 # Refresh the key at the mount-point#012 podman cp $service_key "$container_name:/var/lib/kolla/config_files/src-tls/$service_key"#012 # Copy the new cert from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012 # Copy the new key from the mount-point to the real path#012 podman exec -u root "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012fi#012# Set appropriate permissions#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_crt"#012podman exec -u root "$container_name" chown rabbitmq:rabbitmq "$service_key"#012# Trigger a pem cache clear in RabbitMQ to read the new certificates#012podman exec "$container_name" rabbitmqctl eval "ssl:clear_pem_cache()."#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:05:18 np0005543227 certmonger[38965]: 2025-12-03 08:05:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:18 np0005543227 certmonger[38965]: 2025-12-03 08:05:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:18 np0005543227 certmonger[38965]: 2025-12-03 08:05:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:18 np0005543227 certmonger[38965]: 2025-12-03 08:05:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:18 np0005543227 certmonger[38965]: 2025-12-03 08:05:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:18 np0005543227 certmonger[38965]: 2025-12-03 08:05:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:18 np0005543227 certmonger[38965]: 2025-12-03 08:05:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:18 np0005543227 certmonger[38965]: 2025-12-03 08:05:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:18 np0005543227 certmonger[38965]: 2025-12-03 08:05:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:05:19 np0005543227 certmonger[43492]: " for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_REQ_PRINCIPAL" to "rabbitmq/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:05:19 np0005543227 certmonger[43492]: " for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:05:19 np0005543227 certmonger[43492]: MIID2jCCAsICAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:05:19 np0005543227 certmonger[43492]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArKf2EYyx Dec 3 08:05:19 np0005543227 certmonger[43492]: Kcz6bBQs0Ojtp/9JfKV5Ei5nfibyWAXHdpUL9EhOYlAixEdwydluu4gwakq7PilU Dec 3 08:05:19 np0005543227 certmonger[43492]: er+9BP3SudodU4p1oejl37ucfkUwdUVoE8lYHkVI9/tfO3J/b9Nw4H6r3i3obmFG Dec 3 08:05:19 np0005543227 certmonger[43492]: bJ1RVkSPpSHgJ//EDXZ7aN6U1ok1xmRvHf4V3plZhGK/r8Q5QD4lgokFXG5/OR/L Dec 3 08:05:19 np0005543227 certmonger[43492]: tJku38X1ftff4jRhrB0VFErUOHk+aapB55gWg21WNVq12zMTL+HrU4sBaA9/W195 Dec 3 08:05:19 np0005543227 certmonger[43492]: ADw6u+i9TLB3sNpDsXN0XWq8UsriVVzM42u5wFGMEwOJj7+K+A2cBUtGXK1OU3l1 Dec 3 08:05:19 np0005543227 certmonger[43492]: /6/ve9qHywP63wIDAQABoIIBZzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:05:19 np0005543227 certmonger[43492]: ADAAMwAwADgAMAA1ADEAODCCATYGCSqGSIb3DQEJDjGCAScwggEjMAsGA1UdDwQE Dec 3 08:05:19 np0005543227 certmonger[43492]: AwIFoDCBxwYDVR0RBIG/MIG8giFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:05:19 np0005543227 certmonger[43492]: LnRlc3SgQwYKKwYBBAGCNxQCA6A1DDNyYWJiaXRtcS9ucDAwMDU1NDMyMjcuaW50 Dec 3 08:05:19 np0005543227 certmonger[43492]: ZXJuYWxhcGkub29vLnRlc3RAT09PLlRFU1SgUgYGKwYBBQICoEgwRqAKGwhPT08u Dec 3 08:05:19 np0005543227 certmonger[43492]: VEVTVKE4MDagAwIBAaEvMC0bCHJhYmJpdG1xGyFucDAwMDU1NDMyMjcuaW50ZXJu Dec 3 08:05:19 np0005543227 certmonger[43492]: YWxhcGkub29vLnRlc3QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwG Dec 3 08:05:19 np0005543227 certmonger[43492]: A1UdEwEB/wQCMAAwHQYDVR0OBBYEFBGYqF3kLUMi7BuIZgvqm46DOiG0MA0GCSqG Dec 3 08:05:19 np0005543227 certmonger[43492]: SIb3DQEBCwUAA4IBAQAF2sX4blUWaOAOzU4DxdvinvSyCT/NQEfpU159kwYsMcsZ Dec 3 08:05:19 np0005543227 certmonger[43492]: DCO4n6HwwIYnEWyC6ThfWaiEPa2ubhfv2zbxUnai5NIRMCh03/2k/UGRBzQSnra8 Dec 3 08:05:19 np0005543227 certmonger[43492]: pCaa+mseMfc4BbClH8igsIIq04eIGtst0Pjj+oYOwHRR2HWtx9e3IDM87DXv4LJ3 Dec 3 08:05:19 np0005543227 certmonger[43492]: XX7ro26YqNGwzPuWBDL6I38lUZWYpfNF7dDHrHN0j1FbxqgWMhMgXsYv0NfNOiTd Dec 3 08:05:19 np0005543227 certmonger[43492]: uRkvTDwdnN5a47qhJhuSvyvu5B3pMZipmwMp0EmZFAVbfBgu4jFDj+LmazD10t8T Dec 3 08:05:19 np0005543227 certmonger[43492]: puTEF9oRRGvAqkkBFs6wbyWvDJlascLdFYMVmJWd Dec 3 08:05:19 np0005543227 certmonger[43492]: -----END CERTIFICATE REQUEST----- Dec 3 08:05:19 np0005543227 certmonger[43492]: " for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCsp/YRjLEpzPpsFCzQ6O2n/0l8pXkSLmd+JvJYBcd2lQv0SE5iUCLER3DJ2W67iDBqSrs+KVR6v70E/dK52h1TinWh6OXfu5x+RTB1RWgTyVgeRUj3+187cn9v03DgfqveLehuYUZsnVFWRI+lIeAn/8QNdnto3pTWiTXGZG8d/hXemVmEYr+vxDlAPiWCiQVcbn85H8u0mS7fxfV+19/iNGGsHRUUStQ4eT5pqkHnmBaDbVY1WrXbMxMv4etTiwFoD39bX3kAPDq76L1MsHew2kOxc3RdarxSyuJVXMzja7nAUYwTA4mPv4r4DZwFS0ZcrU5TeXX/r+972ofLA/rfAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAi8lVkrWlSdX1fb2+rBeZ3CPQZvVWyy9XEl1QuEiQgievBpR2SzaJc3C9nDsNZlldss7Cqmhi8FA+AMEaSNd4hw04D6m7vfH+DRNwaP0/L+Bu0sfVZ+8u0VzzS1RcLi/ZgHbMho+qAvMA5VC8nxLF2lSSb71OUMgFR1R6DOUY40KiSyIRAJ0aEY017yAvbJMrNZzuMBRdRzhCIoWsQQNo+w4PZUsLzZSE5sJhrY50mKaR1NXG+rkwxwF+GlauFtVNdzXL3gmwdT9gYadm7UMmu6NiNUoM/kj6Lfyb5gqrWcgEvvNo6d5QDQh4MrmFrPLwfDGiXL5r0UGg5NrSCFB5eQ==" for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArKf2EYyxKcz6bBQs0Ojtp/9JfKV5Ei5nfibyWAXHdpUL9EhOYlAixEdwydluu4gwakq7PilUer+9BP3SudodU4p1oejl37ucfkUwdUVoE8lYHkVI9/tfO3J/b9Nw4H6r3i3obmFGbJ1RVkSPpSHgJ//EDXZ7aN6U1ok1xmRvHf4V3plZhGK/r8Q5QD4lgokFXG5/OR/LtJku38X1ftff4jRhrB0VFErUOHk+aapB55gWg21WNVq12zMTL+HrU4sBaA9/W195ADw6u+i9TLB3sNpDsXN0XWq8UsriVVzM42u5wFGMEwOJj7+K+A2cBUtGXK1OU3l1/6/ve9qHywP63wIDAQAB" for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:05:19 np0005543227 certmonger[43492]: 2025-12-03 08:05:19 [43492] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[43492]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:05:19 np0005543227 certmonger[43492]: Certificate: "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" Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Certificate submission still ongoing. Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Certificate submission attempt complete. Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Child status = 0. Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Child output: Dec 3 08:05:19 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:05:19 np0005543227 certmonger[38965]: MIIFXTCCA8WgAwIBAgIBSDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:19 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:19 np0005543227 certmonger[38965]: MDUxOVoXDTI3MTIwNDA4MDUxOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:19 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:19 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAKyn9hGMsSnM+mwULNDo7af/SXyleRIuZ34m Dec 3 08:05:19 np0005543227 certmonger[38965]: 8lgFx3aVC/RITmJQIsRHcMnZbruIMGpKuz4pVHq/vQT90rnaHVOKdaHo5d+7nH5F Dec 3 08:05:19 np0005543227 certmonger[38965]: MHVFaBPJWB5FSPf7Xztyf2/TcOB+q94t6G5hRmydUVZEj6Uh4Cf/xA12e2jelNaJ Dec 3 08:05:19 np0005543227 certmonger[38965]: NcZkbx3+Fd6ZWYRiv6/EOUA+JYKJBVxufzkfy7SZLt/F9X7X3+I0YawdFRRK1Dh5 Dec 3 08:05:19 np0005543227 certmonger[38965]: PmmqQeeYFoNtVjVatdszEy/h61OLAWgPf1tfeQA8OrvovUywd7DaQ7FzdF1qvFLK Dec 3 08:05:19 np0005543227 certmonger[38965]: 4lVczONrucBRjBMDiY+/ivgNnAVLRlytTlN5df+v73vah8sD+t8CAwEAAaOCAe4w Dec 3 08:05:19 np0005543227 certmonger[38965]: ggHqMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:19 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:19 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:19 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:19 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:19 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNFtynurUcTbSXwq3Q9jsWHD Dec 3 08:05:19 np0005543227 certmonger[38965]: kAxGMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:19 np0005543227 certmonger[38965]: dGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTU0MzIyNy5pbnRl Dec 3 08:05:19 np0005543227 certmonger[38965]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5U Dec 3 08:05:19 np0005543227 certmonger[38965]: RVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTU0MzIyNy5pbnRlcm5h Dec 3 08:05:19 np0005543227 certmonger[38965]: bGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAEa3uVlrOvoOnjLceUJTH Dec 3 08:05:19 np0005543227 certmonger[38965]: 8tKPeMFHi9UEr8b6GhXSMsF/6RxAlkkFQ/djAlU6WMU4u9A0WYBOzi07UMtQVXZD Dec 3 08:05:19 np0005543227 certmonger[38965]: i02gfUIu2c58AA0PpdZJw2Pt4gFx12a1ms8KqD30iYsuSf88EPlZ2TVU99M7cEy5 Dec 3 08:05:19 np0005543227 certmonger[38965]: /AoKHLsp1R74fH+2QWHwR8Kpk2ijv0mntpI83D5n42lUGMcTdEu97liVpuPZQcbf Dec 3 08:05:19 np0005543227 certmonger[38965]: cAIycBsrD/MxVJGffDKYDmuRKssapvK8OuEUXxsl1nHLj7aXM6Wx0Esemb7HGeZH Dec 3 08:05:19 np0005543227 certmonger[38965]: 5eiU3PfW2OVnYwCxGSniYgaOk7waCo3y547kEemdyiMkFLX/BLZIoDMExCPdWKKj Dec 3 08:05:19 np0005543227 certmonger[38965]: tea3eXezSHQJ9oNj3Ff1dFlv3JO/+aaQuj538y7auxHXWMnf11J8iTNnEidcbvgm Dec 3 08:05:19 np0005543227 certmonger[38965]: FGrxyXuzKXCJbaivaujHsplrAYJqapppmBMGWCgRIg1vYxEoQTHYs44mIHlWy4pp Dec 3 08:05:19 np0005543227 certmonger[38965]: oXa1C3Yg3lV6pUZd1Q4uwW54m0S58RwXOrF0D5m1iKNl Dec 3 08:05:19 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:05:19 np0005543227 certmonger[38965]: " Dec 3 08:05:19 np0005543227 certmonger[43494]: 2025-12-03 08:05:19 [43494] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:05:19 np0005543227 certmonger[43494]: MIIFXTCCA8WgAwIBAgIBSDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:19 np0005543227 certmonger[43494]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:19 np0005543227 certmonger[43494]: MDUxOVoXDTI3MTIwNDA4MDUxOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:19 np0005543227 certmonger[43494]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:19 np0005543227 certmonger[43494]: hvcNAQEBBQADggEPADCCAQoCggEBAKyn9hGMsSnM+mwULNDo7af/SXyleRIuZ34m Dec 3 08:05:19 np0005543227 certmonger[43494]: 8lgFx3aVC/RITmJQIsRHcMnZbruIMGpKuz4pVHq/vQT90rnaHVOKdaHo5d+7nH5F Dec 3 08:05:19 np0005543227 certmonger[43494]: MHVFaBPJWB5FSPf7Xztyf2/TcOB+q94t6G5hRmydUVZEj6Uh4Cf/xA12e2jelNaJ Dec 3 08:05:19 np0005543227 certmonger[43494]: NcZkbx3+Fd6ZWYRiv6/EOUA+JYKJBVxufzkfy7SZLt/F9X7X3+I0YawdFRRK1Dh5 Dec 3 08:05:19 np0005543227 certmonger[43494]: PmmqQeeYFoNtVjVatdszEy/h61OLAWgPf1tfeQA8OrvovUywd7DaQ7FzdF1qvFLK Dec 3 08:05:19 np0005543227 certmonger[43494]: 4lVczONrucBRjBMDiY+/ivgNnAVLRlytTlN5df+v73vah8sD+t8CAwEAAaOCAe4w Dec 3 08:05:19 np0005543227 certmonger[43494]: ggHqMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:19 np0005543227 certmonger[43494]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:19 np0005543227 certmonger[43494]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:19 np0005543227 certmonger[43494]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:19 np0005543227 certmonger[43494]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:19 np0005543227 certmonger[43494]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNFtynurUcTbSXwq3Q9jsWHD Dec 3 08:05:19 np0005543227 certmonger[43494]: kAxGMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:19 np0005543227 certmonger[43494]: dGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTU0MzIyNy5pbnRl Dec 3 08:05:19 np0005543227 certmonger[43494]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5U Dec 3 08:05:19 np0005543227 certmonger[43494]: RVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTU0MzIyNy5pbnRlcm5h Dec 3 08:05:19 np0005543227 certmonger[43494]: bGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAEa3uVlrOvoOnjLceUJTH Dec 3 08:05:19 np0005543227 certmonger[43494]: 8tKPeMFHi9UEr8b6GhXSMsF/6RxAlkkFQ/djAlU6WMU4u9A0WYBOzi07UMtQVXZD Dec 3 08:05:19 np0005543227 certmonger[43494]: i02gfUIu2c58AA0PpdZJw2Pt4gFx12a1ms8KqD30iYsuSf88EPlZ2TVU99M7cEy5 Dec 3 08:05:19 np0005543227 certmonger[43494]: /AoKHLsp1R74fH+2QWHwR8Kpk2ijv0mntpI83D5n42lUGMcTdEu97liVpuPZQcbf Dec 3 08:05:19 np0005543227 certmonger[43494]: cAIycBsrD/MxVJGffDKYDmuRKssapvK8OuEUXxsl1nHLj7aXM6Wx0Esemb7HGeZH Dec 3 08:05:19 np0005543227 certmonger[43494]: 5eiU3PfW2OVnYwCxGSniYgaOk7waCo3y547kEemdyiMkFLX/BLZIoDMExCPdWKKj Dec 3 08:05:19 np0005543227 certmonger[43494]: tea3eXezSHQJ9oNj3Ff1dFlv3JO/+aaQuj538y7auxHXWMnf11J8iTNnEidcbvgm Dec 3 08:05:19 np0005543227 certmonger[43494]: FGrxyXuzKXCJbaivaujHsplrAYJqapppmBMGWCgRIg1vYxEoQTHYs44mIHlWy4pp Dec 3 08:05:19 np0005543227 certmonger[43494]: oXa1C3Yg3lV6pUZd1Q4uwW54m0S58RwXOrF0D5m1iKNl Dec 3 08:05:19 np0005543227 certmonger[43494]: -----END CERTIFICATE----- Dec 3 08:05:19 np0005543227 certmonger[43494]: ". Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Certificate submission still ongoing. Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Certificate submission postprocessing complete. Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Child status = 0. Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Child output: Dec 3 08:05:19 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\noXa1C3Yg3lV6pUZd1Q4uwW54m0S58RwXOrF0D5m1iKNl\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:05:19 np0005543227 certmonger[38965]: " Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:05:19 np0005543227 certmonger[38965]: MIIFXTCCA8WgAwIBAgIBSDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:05:19 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:05:19 np0005543227 certmonger[38965]: MDUxOVoXDTI3MTIwNDA4MDUxOVowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:05:19 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:05:19 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAKyn9hGMsSnM+mwULNDo7af/SXyleRIuZ34m Dec 3 08:05:19 np0005543227 certmonger[38965]: 8lgFx3aVC/RITmJQIsRHcMnZbruIMGpKuz4pVHq/vQT90rnaHVOKdaHo5d+7nH5F Dec 3 08:05:19 np0005543227 certmonger[38965]: MHVFaBPJWB5FSPf7Xztyf2/TcOB+q94t6G5hRmydUVZEj6Uh4Cf/xA12e2jelNaJ Dec 3 08:05:19 np0005543227 certmonger[38965]: NcZkbx3+Fd6ZWYRiv6/EOUA+JYKJBVxufzkfy7SZLt/F9X7X3+I0YawdFRRK1Dh5 Dec 3 08:05:19 np0005543227 certmonger[38965]: PmmqQeeYFoNtVjVatdszEy/h61OLAWgPf1tfeQA8OrvovUywd7DaQ7FzdF1qvFLK Dec 3 08:05:19 np0005543227 certmonger[38965]: 4lVczONrucBRjBMDiY+/ivgNnAVLRlytTlN5df+v73vah8sD+t8CAwEAAaOCAe4w Dec 3 08:05:19 np0005543227 certmonger[38965]: ggHqMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:05:19 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:05:19 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:05:19 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:05:19 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:05:19 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNFtynurUcTbSXwq3Q9jsWHD Dec 3 08:05:19 np0005543227 certmonger[38965]: kAxGMIHHBgNVHREEgb8wgbyCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:05:19 np0005543227 certmonger[38965]: dGVzdKBDBgorBgEEAYI3FAIDoDUMM3JhYmJpdG1xL25wMDAwNTU0MzIyNy5pbnRl Dec 3 08:05:19 np0005543227 certmonger[38965]: cm5hbGFwaS5vb28udGVzdEBPT08uVEVTVKBSBgYrBgEFAgKgSDBGoAobCE9PTy5U Dec 3 08:05:19 np0005543227 certmonger[38965]: RVNUoTgwNqADAgEBoS8wLRsIcmFiYml0bXEbIW5wMDAwNTU0MzIyNy5pbnRlcm5h Dec 3 08:05:19 np0005543227 certmonger[38965]: bGFwaS5vb28udGVzdDANBgkqhkiG9w0BAQsFAAOCAYEAEa3uVlrOvoOnjLceUJTH Dec 3 08:05:19 np0005543227 certmonger[38965]: 8tKPeMFHi9UEr8b6GhXSMsF/6RxAlkkFQ/djAlU6WMU4u9A0WYBOzi07UMtQVXZD Dec 3 08:05:19 np0005543227 certmonger[38965]: i02gfUIu2c58AA0PpdZJw2Pt4gFx12a1ms8KqD30iYsuSf88EPlZ2TVU99M7cEy5 Dec 3 08:05:19 np0005543227 certmonger[38965]: /AoKHLsp1R74fH+2QWHwR8Kpk2ijv0mntpI83D5n42lUGMcTdEu97liVpuPZQcbf Dec 3 08:05:19 np0005543227 certmonger[38965]: cAIycBsrD/MxVJGffDKYDmuRKssapvK8OuEUXxsl1nHLj7aXM6Wx0Esemb7HGeZH Dec 3 08:05:19 np0005543227 certmonger[38965]: 5eiU3PfW2OVnYwCxGSniYgaOk7waCo3y547kEemdyiMkFLX/BLZIoDMExCPdWKKj Dec 3 08:05:19 np0005543227 certmonger[38965]: tea3eXezSHQJ9oNj3Ff1dFlv3JO/+aaQuj538y7auxHXWMnf11J8iTNnEidcbvgm Dec 3 08:05:19 np0005543227 certmonger[38965]: FGrxyXuzKXCJbaivaujHsplrAYJqapppmBMGWCgRIg1vYxEoQTHYs44mIHlWy4pp Dec 3 08:05:19 np0005543227 certmonger[38965]: oXa1C3Yg3lV6pUZd1Q4uwW54m0S58RwXOrF0D5m1iKNl Dec 3 08:05:19 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:05:19 np0005543227 certmonger[38965]: ". Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] No hooks set for pre-save command. Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 certmonger[38965]: 2025-12-03 08:05:19 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:19 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:19 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:20 np0005543227 certmonger[38965]: 2025-12-03 08:05:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:20 np0005543227 certmonger[38965]: 2025-12-03 08:05:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:20 np0005543227 certmonger[43598]: Certificate in file "/etc/pki/tls/certs/rabbitmq.crt" issued by CA and saved. Dec 3 08:05:20 np0005543227 certmonger[38965]: 2025-12-03 08:05:20 [38965] Wrote to /var/lib/certmonger/requests/20251203080518 Dec 3 08:05:20 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:20 np0005543227 python3[43614]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:05:26 np0005543227 podman[43615]: 2025-12-03 08:05:20.976964137 +0000 UTC m=+0.048932802 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 08:05:26 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:27 np0005543227 python3[43681]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 cluster.common.tag/rabbitmq:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:05:27 np0005543227 podman[43682]: 2025-12-03 08:05:27.367805583 +0000 UTC m=+0.046677582 image tag cf4ab8456a3abe57a7f04fa72c2968e2d1110502686fa60ebe007d8aced3db7d cluster.common.tag/rabbitmq:pcmklatest Dec 3 08:05:27 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:27 np0005543227 python3[43710]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:27 np0005543227 python3[43710]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 --format json Dec 3 08:05:28 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:28 np0005543227 python3[43710]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 -q --tls-verify=false Dec 3 08:05:32 np0005543227 podman[43722]: 2025-12-03 08:05:28.06820563 +0000 UTC m=+0.043967249 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server:17.1 Dec 3 08:05:32 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:32 np0005543227 python3[43710]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a616d7a557ed72e2cb3c2f707314a11eec1313a010753921e54a824d721f2301 --format json Dec 3 08:05:32 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:32 np0005543227 python3[43810]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:32 np0005543227 python3[43810]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 --format json Dec 3 08:05:33 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:33 np0005543227 python3[43810]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 -q --tls-verify=false Dec 3 08:05:37 np0005543227 podman[43823]: 2025-12-03 08:05:33.097312521 +0000 UTC m=+0.042198615 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-northd:17.1 Dec 3 08:05:37 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:37 np0005543227 python3[43810]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7ad54cee06bf23c7a73c6382f7e21cdf8ca093b59b1eba9d085eff95472a36e6 --format json Dec 3 08:05:37 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:37 np0005543227 python3[43900]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:37 np0005543227 python3[43900]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 --format json Dec 3 08:05:37 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:37 np0005543227 python3[43900]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 -q --tls-verify=false Dec 3 08:05:40 np0005543227 podman[43913]: 2025-12-03 08:05:37.999078828 +0000 UTC m=+0.046027592 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server:17.1 Dec 3 08:05:40 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:40 np0005543227 python3[43900]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8ece98bf1089a0d3fdab5c6a92a2dd64fc4b0f8b7a05f2bfebd5d06b0149991f --format json Dec 3 08:05:40 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:40 np0005543227 python3[43992]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:40 np0005543227 python3[43992]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 --format json Dec 3 08:05:40 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:40 np0005543227 python3[43992]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 -q --tls-verify=false Dec 3 08:05:43 np0005543227 podman[44004]: 2025-12-03 08:05:40.72304491 +0000 UTC m=+0.056197080 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 08:05:43 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:43 np0005543227 python3[43992]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8bd08f386db64f8894158012c608a496eb287cf99090b41e503a9bc591b481e6 --format json Dec 3 08:05:43 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:44 np0005543227 python3[44082]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:44 np0005543227 python3[44082]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 --format json Dec 3 08:05:44 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:44 np0005543227 python3[44082]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 -q --tls-verify=false Dec 3 08:05:46 np0005543227 podman[44094]: 2025-12-03 08:05:44.237995439 +0000 UTC m=+0.036053217 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 08:05:46 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:46 np0005543227 python3[44082]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect bac901955dcf7a32a493c6ef724c092009bbc18467858aa8c55e916b8c2b2b8f --format json Dec 3 08:05:46 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:47 np0005543227 python3[44172]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:47 np0005543227 python3[44172]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 --format json Dec 3 08:05:47 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:47 np0005543227 python3[44172]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 -q --tls-verify=false Dec 3 08:05:50 np0005543227 podman[44186]: 2025-12-03 08:05:47.215263851 +0000 UTC m=+0.046934290 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 08:05:50 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:50 np0005543227 python3[44172]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b13c44df76d5b3bb87652b20507cc40d62568630b0249319c13c07bbb18c36c3 --format json Dec 3 08:05:50 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:51 np0005543227 python3[44496]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:51 np0005543227 python3[44496]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 --format json Dec 3 08:05:51 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:51 np0005543227 python3[44496]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 -q --tls-verify=false Dec 3 08:05:52 np0005543227 podman[44509]: 2025-12-03 08:05:51.249305506 +0000 UTC m=+0.044442105 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 08:05:52 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:52 np0005543227 python3[44496]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect cf4ab8456a3abe57a7f04fa72c2968e2d1110502686fa60ebe007d8aced3db7d --format json Dec 3 08:05:52 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:52 np0005543227 python3[44575]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:52 np0005543227 python3[44575]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 --format json Dec 3 08:05:53 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:53 np0005543227 python3[44575]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 -q --tls-verify=false Dec 3 08:05:57 np0005543227 podman[44588]: 2025-12-03 08:05:53.093579963 +0000 UTC m=+0.042525215 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 08:05:57 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:57 np0005543227 python3[44575]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b9d7c6447d3e11e4b7bc4c1a8872a5471a9020b0347f9e0a44060d9b2823bfe3 --format json Dec 3 08:05:58 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:58 np0005543227 python3[44668]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:05:58 np0005543227 python3[44668]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 --format json Dec 3 08:05:58 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:05:58 np0005543227 python3[44668]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 -q --tls-verify=false Dec 3 08:06:02 np0005543227 podman[44681]: 2025-12-03 08:05:58.493487268 +0000 UTC m=+0.034414704 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Dec 3 08:06:02 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:02 np0005543227 python3[44668]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 0b85a6c916779a2364dabc601af2849008f8a7bb090497d470f183826d209742 --format json Dec 3 08:06:02 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:02 np0005543227 python3[44759]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:02 np0005543227 python3[44759]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 --format json Dec 3 08:06:02 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:02 np0005543227 python3[44759]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 -q --tls-verify=false Dec 3 08:06:04 np0005543227 podman[44772]: 2025-12-03 08:06:02.790653914 +0000 UTC m=+0.043080640 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1 Dec 3 08:06:04 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:04 np0005543227 python3[44759]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 8bb56ea60f206582ac0e8abc44419c975a910cdb0dffbce91bd34eb53d7f0cc0 --format json Dec 3 08:06:04 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:04 np0005543227 python3[44850]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:04 np0005543227 python3[44850]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 --format json Dec 3 08:06:04 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:04 np0005543227 python3[44850]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 -q --tls-verify=false Dec 3 08:06:14 np0005543227 podman[44863]: 2025-12-03 08:06:05.04547759 +0000 UTC m=+0.036268412 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 08:06:14 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:14 np0005543227 python3[44850]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 2d473f0d6d0f3d389f26cf8e584cb2217e1a9f089f6623537c64c4ebe593ba39 --format json Dec 3 08:06:14 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:14 np0005543227 python3[44940]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:14 np0005543227 python3[44940]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 --format json Dec 3 08:06:14 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:14 np0005543227 python3[44940]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 -q --tls-verify=false Dec 3 08:06:21 np0005543227 podman[44952]: 2025-12-03 08:06:14.798829421 +0000 UTC m=+0.041831887 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1 Dec 3 08:06:21 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:21 np0005543227 python3[44940]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 59c0f32bbd0d880fb7671f77c7f9fe7eba6371b76ea661a3802be79175c9cf97 --format json Dec 3 08:06:21 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:21 np0005543227 python3[45042]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:21 np0005543227 python3[45042]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 --format json Dec 3 08:06:21 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:21 np0005543227 python3[45042]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 -q --tls-verify=false Dec 3 08:06:29 np0005543227 podman[45054]: 2025-12-03 08:06:21.741003052 +0000 UTC m=+0.048229343 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Dec 3 08:06:29 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:29 np0005543227 python3[45042]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d33cd7cbe30b5f4b1aaa37c443e1d6a0ab7f5cf2aaa69525a32fda95900b6c10 --format json Dec 3 08:06:29 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:29 np0005543227 python3[45133]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:29 np0005543227 python3[45133]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 --format json Dec 3 08:06:29 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:29 np0005543227 python3[45133]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 -q --tls-verify=false Dec 3 08:06:34 np0005543227 podman[45146]: 2025-12-03 08:06:29.536085576 +0000 UTC m=+0.035390430 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Dec 3 08:06:34 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:34 np0005543227 python3[45133]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 431c4154374af6b6d532165560f80c367b832346d0d836548da79db297917d4e --format json Dec 3 08:06:34 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:34 np0005543227 python3[45225]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:34 np0005543227 python3[45225]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 --format json Dec 3 08:06:34 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:34 np0005543227 python3[45225]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 -q --tls-verify=false Dec 3 08:06:37 np0005543227 podman[45238]: 2025-12-03 08:06:34.773143382 +0000 UTC m=+0.046396115 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Dec 3 08:06:37 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:37 np0005543227 python3[45225]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d91d671d486b16c1c793bf9221f9d0576c18fc58940981d37833abeb53fd5301 --format json Dec 3 08:06:37 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:37 np0005543227 python3[45315]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:37 np0005543227 python3[45315]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 --format json Dec 3 08:06:37 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:37 np0005543227 python3[45315]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 -q --tls-verify=false Dec 3 08:06:48 np0005543227 podman[45327]: 2025-12-03 08:06:37.901624719 +0000 UTC m=+0.043851459 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Dec 3 08:06:48 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:48 np0005543227 python3[45315]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a579d4fdbda482f87d090081f6e846234e7904d62181a063e2d9b35577177b9f --format json Dec 3 08:06:48 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:48 np0005543227 python3[45435]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:06:48 np0005543227 python3[45435]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 --format json Dec 3 08:06:49 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:06:49 np0005543227 python3[45435]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 -q --tls-verify=false Dec 3 08:07:00 np0005543227 podman[45447]: 2025-12-03 08:06:49.082935578 +0000 UTC m=+0.043484814 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 08:07:00 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:00 np0005543227 python3[45435]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ea72abdd68f9a2d0af97778644413f0df0dab9d453b865185a199c5c12f4e55d --format json Dec 3 08:07:00 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:00 np0005543227 python3[45766]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:00 np0005543227 python3[45766]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 --format json Dec 3 08:07:00 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:00 np0005543227 python3[45766]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 -q --tls-verify=false Dec 3 08:07:02 np0005543227 podman[45778]: 2025-12-03 08:07:00.501609616 +0000 UTC m=+0.041929555 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-conductor:17.1 Dec 3 08:07:02 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:02 np0005543227 python3[45766]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 835b9fac535c710ebcd7589f0ff14498479122b0c8b5628384d8a3491dd522b8 --format json Dec 3 08:07:02 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:03 np0005543227 python3[45855]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:03 np0005543227 python3[45855]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 --format json Dec 3 08:07:03 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:03 np0005543227 python3[45855]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 -q --tls-verify=false Dec 3 08:07:06 np0005543227 podman[45868]: 2025-12-03 08:07:03.300209045 +0000 UTC m=+0.047480215 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Dec 3 08:07:06 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:06 np0005543227 python3[45855]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ff1f91308b6fbe9092c5f1e2edb9f228bf32084b8df80485aea656b2849547d7 --format json Dec 3 08:07:06 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:07 np0005543227 python3[45946]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:07 np0005543227 python3[45946]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 --format json Dec 3 08:07:07 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:07 np0005543227 python3[45946]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 -q --tls-verify=false Dec 3 08:07:11 np0005543227 podman[45959]: 2025-12-03 08:07:07.440125762 +0000 UTC m=+0.043202254 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification:17.1 Dec 3 08:07:11 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:11 np0005543227 python3[45946]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 93ea0c0505cfd89e3e321f4bacb12a17fef6f01eb6141df9dbcc45821d42917f --format json Dec 3 08:07:11 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:12 np0005543227 python3[46050]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:12 np0005543227 python3[46050]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 --format json Dec 3 08:07:12 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:12 np0005543227 python3[46050]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 -q --tls-verify=false Dec 3 08:07:13 np0005543227 podman[46062]: 2025-12-03 08:07:12.401459107 +0000 UTC m=+0.041194902 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Dec 3 08:07:13 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:13 np0005543227 python3[46050]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 01162f309a727f9f16ef893d348a6167be101f9c31f2a9a381f4a430ffc3b21a --format json Dec 3 08:07:13 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:14 np0005543227 python3[46128]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:14 np0005543227 python3[46128]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 --format json Dec 3 08:07:14 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:14 np0005543227 python3[46128]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 -q --tls-verify=false Dec 3 08:07:15 np0005543227 podman[46141]: 2025-12-03 08:07:14.201302755 +0000 UTC m=+0.046473535 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Dec 3 08:07:15 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:15 np0005543227 python3[46128]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ccd22ddeb69c8f3a05d2d3f97d21f9fa64c6f2bc3a156f93212de7feacea314f --format json Dec 3 08:07:15 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:16 np0005543227 python3[46208]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:16 np0005543227 python3[46208]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 --format json Dec 3 08:07:16 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:16 np0005543227 python3[46208]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 -q --tls-verify=false Dec 3 08:07:20 np0005543227 podman[46220]: 2025-12-03 08:07:16.477857739 +0000 UTC m=+0.043498074 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Dec 3 08:07:20 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:20 np0005543227 python3[46208]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 24976907b2c2553304119aba5731a800204d664feed24ca9eb7f2b4c7d81016b --format json Dec 3 08:07:20 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:21 np0005543227 python3[46297]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:21 np0005543227 python3[46297]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 --format json Dec 3 08:07:21 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:21 np0005543227 python3[46297]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 -q --tls-verify=false Dec 3 08:07:23 np0005543227 podman[46541]: 2025-12-03 08:07:21.678689492 +0000 UTC m=+0.038562083 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Dec 3 08:07:23 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:23 np0005543227 python3[46297]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 57163a7b21fdbb804a27897cb6e6052a5e5c7a339c45d663e80b52375a760dcf --format json Dec 3 08:07:23 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:24 np0005543227 python3[46620]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:24 np0005543227 python3[46620]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 --format json Dec 3 08:07:24 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:24 np0005543227 python3[46620]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 -q --tls-verify=false Dec 3 08:07:25 np0005543227 podman[46632]: 2025-12-03 08:07:24.370606112 +0000 UTC m=+0.046869307 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-share:17.1 Dec 3 08:07:25 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:25 np0005543227 python3[46620]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect b9682dee21d7c5836da0f5094cc87a67e8c855fb08692e50824e31ad6f3d7b7f --format json Dec 3 08:07:25 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:25 np0005543227 python3[46698]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:25 np0005543227 python3[46698]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 --format json Dec 3 08:07:26 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:26 np0005543227 python3[46698]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 -q --tls-verify=false Dec 3 08:07:28 np0005543227 podman[46712]: 2025-12-03 08:07:26.141048758 +0000 UTC m=+0.052756837 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Dec 3 08:07:28 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:28 np0005543227 python3[46698]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 076d82a27d63c8328729ed27ceb4291585ae18d017befe6fe353df7aa11715ae --format json Dec 3 08:07:28 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:28 np0005543227 python3[46790]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:28 np0005543227 python3[46790]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 --format json Dec 3 08:07:28 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:28 np0005543227 python3[46790]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 -q --tls-verify=false Dec 3 08:07:32 np0005543227 podman[46802]: 2025-12-03 08:07:28.903340785 +0000 UTC m=+0.045672780 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 08:07:32 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:32 np0005543227 python3[46790]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect a2405b5037b4ecda355ba679b0452a03af79396a3962d913c65d6e971ae04ad9 --format json Dec 3 08:07:32 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:33 np0005543227 python3[46893]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:33 np0005543227 python3[46893]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 --format json Dec 3 08:07:33 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:33 np0005543227 python3[46893]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 -q --tls-verify=false Dec 3 08:07:35 np0005543227 podman[47132]: 2025-12-03 08:07:33.600030203 +0000 UTC m=+0.039080429 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-account:17.1 Dec 3 08:07:35 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:35 np0005543227 python3[46893]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d9a3b5ac0adeeb65fb1be6ff5d0045b0f5c343dcfec19ba43a878e23890d2b6e --format json Dec 3 08:07:35 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:36 np0005543227 python3[47211]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:36 np0005543227 python3[47211]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 --format json Dec 3 08:07:36 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:36 np0005543227 python3[47211]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 -q --tls-verify=false Dec 3 08:07:38 np0005543227 podman[47224]: 2025-12-03 08:07:36.32680183 +0000 UTC m=+0.044175234 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Dec 3 08:07:38 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:38 np0005543227 python3[47211]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 9bc6fb316da179dd124d351484d6f1112e635a607defab7b2cc5463bbb6bf086 --format json Dec 3 08:07:38 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:39 np0005543227 python3[47302]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:39 np0005543227 python3[47302]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 --format json Dec 3 08:07:39 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:39 np0005543227 python3[47302]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 -q --tls-verify=false Dec 3 08:07:42 np0005543227 podman[47315]: 2025-12-03 08:07:39.490659331 +0000 UTC m=+0.044437243 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Dec 3 08:07:42 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:42 np0005543227 python3[47302]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect e6e981540e553415b2d6eda490d7683db07164af2e7a0af8245623900338a4d6 --format json Dec 3 08:07:42 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:42 np0005543227 python3[47393]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:42 np0005543227 python3[47393]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 --format json Dec 3 08:07:42 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:42 np0005543227 python3[47393]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 -q --tls-verify=false Dec 3 08:07:45 np0005543227 podman[47405]: 2025-12-03 08:07:42.614099943 +0000 UTC m=+0.045551356 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 08:07:45 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:45 np0005543227 python3[47393]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 5710c4c9977d2ec6efe2229a91f94fd5ac38b06ccb63c09ee3ce15dd3c2f8756 --format json Dec 3 08:07:45 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:45 np0005543227 python3[47483]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:45 np0005543227 python3[47483]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 --format json Dec 3 08:07:45 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:45 np0005543227 python3[47483]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 -q --tls-verify=false Dec 3 08:07:47 np0005543227 podman[47495]: 2025-12-03 08:07:45.671330697 +0000 UTC m=+0.037192361 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Dec 3 08:07:47 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:47 np0005543227 python3[47483]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect ede96ea916c936d09aefbff926e4cdbe1be4aeb7a9a1581064259698ac9d6d38 --format json Dec 3 08:07:47 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:48 np0005543227 python3[47574]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:48 np0005543227 python3[47574]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 --format json Dec 3 08:07:48 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:48 np0005543227 python3[47574]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 -q --tls-verify=false Dec 3 08:07:51 np0005543227 podman[47586]: 2025-12-03 08:07:48.37373505 +0000 UTC m=+0.043644150 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Dec 3 08:07:51 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:51 np0005543227 python3[47574]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 87ee88cbf01fb42e0b22747072843bcca6130a90eda4de6e74b3ccd847bb4040 --format json Dec 3 08:07:51 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:52 np0005543227 python3[47665]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:52 np0005543227 python3[47665]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 --format json Dec 3 08:07:52 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:52 np0005543227 python3[47665]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 -q --tls-verify=false Dec 3 08:07:54 np0005543227 podman[47678]: 2025-12-03 08:07:52.484597652 +0000 UTC m=+0.031970800 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler:17.1 Dec 3 08:07:54 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:54 np0005543227 python3[47665]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect d51fd7ce5400a7c4800bb82d80a52f917f3accf6aa602b7c20c427b481ad1e6b --format json Dec 3 08:07:54 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:54 np0005543227 python3[47754]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:54 np0005543227 python3[47754]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 --format json Dec 3 08:07:54 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:54 np0005543227 python3[47754]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 -q --tls-verify=false Dec 3 08:07:57 np0005543227 podman[47847]: 2025-12-03 08:07:54.90787993 +0000 UTC m=+0.040556752 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler:17.1 Dec 3 08:07:57 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:57 np0005543227 python3[47754]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 6888a3a7246be9d1931c9a82c3e6b98c4ec30e2e363b80647ef78110ef87f229 --format json Dec 3 08:07:57 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:57 np0005543227 python3[47925]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:07:57 np0005543227 python3[47925]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 --format json Dec 3 08:07:57 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:07:57 np0005543227 python3[47925]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 -q --tls-verify=false Dec 3 08:08:00 np0005543227 podman[47938]: 2025-12-03 08:07:57.765688961 +0000 UTC m=+0.045536681 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy:17.1 Dec 3 08:08:00 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:00 np0005543227 python3[47925]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect bca5bfd4d7b21ee858ad76cbe422ed1ea846fc4024ae502e9ed52eba39883d76 --format json Dec 3 08:08:00 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:01 np0005543227 python3[48017]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:08:01 np0005543227 python3[48017]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 --format json Dec 3 08:08:01 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:01 np0005543227 python3[48017]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 -q --tls-verify=false Dec 3 08:08:03 np0005543227 podman[48029]: 2025-12-03 08:08:01.393180396 +0000 UTC m=+0.049516057 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-container:17.1 Dec 3 08:08:03 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:03 np0005543227 python3[48017]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 4d6ea8e2ec83f47f1713b4a93aa453a808e455a73bda48fb8ecdf020c5ccd5cb --format json Dec 3 08:08:03 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:03 np0005543227 python3[48105]: ansible-containers.podman.podman_image Invoked with force=True name=registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 validate_certs=False tag=latest pull=True push=False state=present executable=podman build={'force_rm': False, 'format': 'oci', 'cache': True, 'rm': True, 'annotation': None, 'volume': None, 'extra_args': None} push_args={'compress': None, 'format': None, 'remove_signatures': None, 'sign_by': None, 'dest': None, 'transport': None} path=None auth_file=None username=None password=NOT_LOGGING_PARAMETER ca_cert_dir=None Dec 3 08:08:03 np0005543227 python3[48105]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman image ls registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 --format json Dec 3 08:08:03 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:03 np0005543227 python3[48105]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 -q --tls-verify=false Dec 3 08:08:06 np0005543227 podman[48117]: 2025-12-03 08:08:03.995217149 +0000 UTC m=+0.049271058 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-object:17.1 Dec 3 08:08:06 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:06 np0005543227 python3[48105]: ansible-containers.podman.podman_image PODMAN-IMAGE-DEBUG: /bin/podman inspect 7c77ef06363cc542abd59edc23ca348c84dc9f8a4ac2248a34728abb4e15057d --format json Dec 3 08:08:06 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:07 np0005543227 python3[48195]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Dec 3 08:08:08 np0005543227 python3[48215]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:08:11 np0005543227 python3[48232]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Dec 3 08:08:14 np0005543227 python3[48249]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:08:15 np0005543227 python3[48265]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:08:16 np0005543227 python3[48281]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 08:08:17 np0005543227 python3[48299]: ansible-certificate_request Invoked with name=redis dns=['np0005543227.internalapi.ooo.test', 'overcloud.internalapi.ooo.test'] principal=['redis/np0005543227.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=container_name=$(podman ps --format=\{\{.Names\}\} | grep redis_tls_proxy)#012service_crt="/etc/pki/tls/certs/redis.crt"#012service_key="/etc/pki/tls/private/redis.key"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_crt" "$service_crt"#012# Copy the new cert from the mount-point to the real path#012podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_key" "$service_key"#012# Set appropriate permissions#012podman exec "$container_name" chown memcached:memcached "$service_crt"#012podman exec "$container_name" chown memcached:memcached "$service_key"#012# Trigger a reload for stunnel to read the new certificate#012podman exec pkill -o -HUP stunnel#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005543227.internalapi.ooo.test" for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005543227.internalapi.ooo.test Dec 3 08:08:17 np0005543227 certmonger[48309]: overcloud.internalapi.ooo.test Dec 3 08:08:17 np0005543227 certmonger[48309]: " for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_REQ_PRINCIPAL" to "redis/np0005543227.internalapi.ooo.test@OOO.TEST Dec 3 08:08:17 np0005543227 certmonger[48309]: " for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Dec 3 08:08:17 np0005543227 certmonger[48309]: MIID9DCCAtwCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTQzMjI3LmludGVybmFsYXBp Dec 3 08:08:17 np0005543227 certmonger[48309]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvt2fvFu7 Dec 3 08:08:17 np0005543227 certmonger[48309]: neAmsiQ1hGJzq5m7VwyZpWQfo419ufYpYOVliQWpWXr5ir+czj2CQS7UcMLsrXSh Dec 3 08:08:17 np0005543227 certmonger[48309]: n2AQOu18RfwYTIVniBwg6cjtAQt/26nKzk9n7XL28pmJStNgqr1RlGJ+jESABW9d Dec 3 08:08:17 np0005543227 certmonger[48309]: ZWnoSjkTN28gYR3DFCebXeXmBq4wLpK+IJs9i1lEcp/QmcHT4eY4Fqf5LhJUdzpN Dec 3 08:08:17 np0005543227 certmonger[48309]: SeH2WBTB07lWdg8xNiGrIYQ4zixaF/mz0j5VK0LCmvVfRqCXI6cWDrnfFPeCSvBZ Dec 3 08:08:17 np0005543227 certmonger[48309]: D/+1dykBz+w6xO56Wjy0JqHQBuJzqJuuxh82HN+/Oz889uNGnDRRJqCJRMwNtOpG Dec 3 08:08:17 np0005543227 certmonger[48309]: /Ml5EgYzKJ1AOwIDAQABoIIBgTArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAy Dec 3 08:08:17 np0005543227 certmonger[48309]: ADAAMwAwADgAMAA4ADEANzCCAVAGCSqGSIb3DQEJDjGCAUEwggE9MAsGA1UdDwQE Dec 3 08:08:17 np0005543227 certmonger[48309]: AwIFoDCB4QYDVR0RBIHZMIHWgiFucDAwMDU1NDMyMjcuaW50ZXJuYWxhcGkub29v Dec 3 08:08:17 np0005543227 certmonger[48309]: LnRlc3SCHm92ZXJjbG91ZC5pbnRlcm5hbGFwaS5vb28udGVzdKBABgorBgEEAYI3 Dec 3 08:08:17 np0005543227 certmonger[48309]: FAIDoDIMMHJlZGlzL25wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdEBP Dec 3 08:08:17 np0005543227 certmonger[48309]: T08uVEVTVKBPBgYrBgEFAgKgRTBDoAobCE9PTy5URVNUoTUwM6ADAgEBoSwwKhsF Dec 3 08:08:17 np0005543227 certmonger[48309]: cmVkaXMbIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDAdBgNVHSUE Dec 3 08:08:17 np0005543227 certmonger[48309]: FjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU Dec 3 08:08:17 np0005543227 certmonger[48309]: EZioXeQtQyLsG4hmC+qbjoM6IbQwDQYJKoZIhvcNAQELBQADggEBAE3HAf6RIft8 Dec 3 08:08:17 np0005543227 certmonger[48309]: 2w9qbkMLi8LHt0Pr63ZnpaHAaJOs7rhLWD4aqFoi8Usnu30ynx/WFBiddgGV2hRx Dec 3 08:08:17 np0005543227 certmonger[48309]: bDFh5IRB2kJWfrFOvbJmdd2MzckfYOBpss6vc6o5TYPaEsGAHAGbmfziAm2dMPU6 Dec 3 08:08:17 np0005543227 certmonger[48309]: tP4jdhiPYm3BSNoIXM3mCTncWxVckUqWwOLBaqgl/vfB7/ecw5a1FQCZwii6wz/z Dec 3 08:08:17 np0005543227 certmonger[48309]: m9ifWmkAbUy1Cel+UQ/dmg/b2OCujIFcLT50w1debV0qqDKVlueKE2Hckj3zGQxg Dec 3 08:08:17 np0005543227 certmonger[48309]: 4PxXInrRPGwXenWQATiS0QsXgIesdDfmwzd+oq0Y32HIshswkZ/4eKDlj1nNpatY Dec 3 08:08:17 np0005543227 certmonger[48309]: 9VyAmWp1TPc= Dec 3 08:08:17 np0005543227 certmonger[48309]: -----END CERTIFICATE REQUEST----- Dec 3 08:08:17 np0005543227 certmonger[48309]: " for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_SPKAC" to "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" for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvt2fvFu7neAmsiQ1hGJzq5m7VwyZpWQfo419ufYpYOVliQWpWXr5ir+czj2CQS7UcMLsrXShn2AQOu18RfwYTIVniBwg6cjtAQt/26nKzk9n7XL28pmJStNgqr1RlGJ+jESABW9dZWnoSjkTN28gYR3DFCebXeXmBq4wLpK+IJs9i1lEcp/QmcHT4eY4Fqf5LhJUdzpNSeH2WBTB07lWdg8xNiGrIYQ4zixaF/mz0j5VK0LCmvVfRqCXI6cWDrnfFPeCSvBZD/+1dykBz+w6xO56Wjy0JqHQBuJzqJuuxh82HN+/Oz889uNGnDRRJqCJRMwNtOpG/Ml5EgYzKJ1AOwIDAQAB" for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Dec 3 08:08:17 np0005543227 certmonger[48309]: 2025-12-03 08:08:17 [48309] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Dec 3 08:08:17 np0005543227 certmonger[38965]: 2025-12-03 08:08:17 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:17 np0005543227 certmonger[48309]: Submitting request to "https://ipa.ooo.test/ipa/json". Dec 3 08:08:18 np0005543227 certmonger[48309]: Certificate: "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" Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Certificate submission still ongoing. Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Certificate submission attempt complete. Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Child status = 0. Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Child output: Dec 3 08:08:18 np0005543227 certmonger[38965]: "-----BEGIN CERTIFICATE----- Dec 3 08:08:18 np0005543227 certmonger[38965]: MIIFdzCCA9+gAwIBAgIBSzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:08:18 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:08:18 np0005543227 certmonger[38965]: MDgxOFoXDTI3MTIwNDA4MDgxOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:08:18 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:08:18 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAL7dn7xbu53gJrIkNYRic6uZu1cMmaVkH6ON Dec 3 08:08:18 np0005543227 certmonger[38965]: fbn2KWDlZYkFqVl6+Yq/nM49gkEu1HDC7K10oZ9gEDrtfEX8GEyFZ4gcIOnI7QEL Dec 3 08:08:18 np0005543227 certmonger[38965]: f9upys5PZ+1y9vKZiUrTYKq9UZRifoxEgAVvXWVp6Eo5EzdvIGEdwxQnm13l5gau Dec 3 08:08:18 np0005543227 certmonger[38965]: MC6SviCbPYtZRHKf0JnB0+HmOBan+S4SVHc6TUnh9lgUwdO5VnYPMTYhqyGEOM4s Dec 3 08:08:18 np0005543227 certmonger[38965]: Whf5s9I+VStCwpr1X0aglyOnFg653xT3gkrwWQ//tXcpAc/sOsTuelo8tCah0Abi Dec 3 08:08:18 np0005543227 certmonger[38965]: c6ibrsYfNhzfvzs/PPbjRpw0USagiUTMDbTqRvzJeRIGMyidQDsCAwEAAaOCAggw Dec 3 08:08:18 np0005543227 certmonger[38965]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:08:18 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:08:18 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:08:18 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:08:18 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:08:18 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJ+xdouBS6+FSplg5ulqeRPX Dec 3 08:08:18 np0005543227 certmonger[38965]: j4DhMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:08:18 np0005543227 certmonger[38965]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:08:18 np0005543227 certmonger[38965]: AgOgMgwwcmVkaXMvbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:08:18 np0005543227 certmonger[38965]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy Dec 3 08:08:18 np0005543227 certmonger[38965]: ZWRpcxshbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:08:18 np0005543227 certmonger[38965]: DQEBCwUAA4IBgQAOE2LvsmZKwk/nVNEUQAwcIyhSwhdYgMy8ZJLfReHfFnZKFy8h Dec 3 08:08:18 np0005543227 certmonger[38965]: 2W9iR0K6NsYNrWNi8LcOJPxWoBSVhq9atRS8tK8MBJIKoBXQHCE5FrC+4KFtgzGJ Dec 3 08:08:18 np0005543227 certmonger[38965]: JH3ziRc/gIRWWwgGiEKNzwyUqA2L1BNh9RmluOMVTia7t4EWrtnrmbaDaU/kJj1T Dec 3 08:08:18 np0005543227 certmonger[38965]: boeKtMSpf4Ixs8yVmyoenFWLgzQx0uORWi6g/79qLjaN/VhAHDYsjQA0LvGKy1C0 Dec 3 08:08:18 np0005543227 certmonger[38965]: 3XmhgwPVItg9vAp5b1B1Sc9pmW49lnnMUS9qwaI7YjRIO24O8E+bzsMQ6vYcxB1b Dec 3 08:08:18 np0005543227 certmonger[38965]: dzeltGl44+0/Aga9l4DwEJNWxjYyGEtzG3UDxMFNaJRaLYAWlbStTnXDEiFqmYXh Dec 3 08:08:18 np0005543227 certmonger[38965]: +IcQM2Ys8lTkZ5liSy0Km/du77f8Syj4CQbX9mqdesAd9lTjhbgKpxpz5KGv0GZt Dec 3 08:08:18 np0005543227 certmonger[38965]: MFRpSrbYnwWENnLWYtSMPnJgJWA3Bw3cHeqN8OCHYz7ur1F8GR708lBllcFgA7Fg Dec 3 08:08:18 np0005543227 certmonger[38965]: ORN03ew2QAC/Jeg= Dec 3 08:08:18 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:08:18 np0005543227 certmonger[38965]: " Dec 3 08:08:18 np0005543227 certmonger[48311]: 2025-12-03 08:08:18 [48311] Postprocessing output "-----BEGIN CERTIFICATE----- Dec 3 08:08:18 np0005543227 certmonger[48311]: MIIFdzCCA9+gAwIBAgIBSzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:08:18 np0005543227 certmonger[48311]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:08:18 np0005543227 certmonger[48311]: MDgxOFoXDTI3MTIwNDA4MDgxOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:08:18 np0005543227 certmonger[48311]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:08:18 np0005543227 certmonger[48311]: hvcNAQEBBQADggEPADCCAQoCggEBAL7dn7xbu53gJrIkNYRic6uZu1cMmaVkH6ON Dec 3 08:08:18 np0005543227 certmonger[48311]: fbn2KWDlZYkFqVl6+Yq/nM49gkEu1HDC7K10oZ9gEDrtfEX8GEyFZ4gcIOnI7QEL Dec 3 08:08:18 np0005543227 certmonger[48311]: f9upys5PZ+1y9vKZiUrTYKq9UZRifoxEgAVvXWVp6Eo5EzdvIGEdwxQnm13l5gau Dec 3 08:08:18 np0005543227 certmonger[48311]: MC6SviCbPYtZRHKf0JnB0+HmOBan+S4SVHc6TUnh9lgUwdO5VnYPMTYhqyGEOM4s Dec 3 08:08:18 np0005543227 certmonger[48311]: Whf5s9I+VStCwpr1X0aglyOnFg653xT3gkrwWQ//tXcpAc/sOsTuelo8tCah0Abi Dec 3 08:08:18 np0005543227 certmonger[48311]: c6ibrsYfNhzfvzs/PPbjRpw0USagiUTMDbTqRvzJeRIGMyidQDsCAwEAAaOCAggw Dec 3 08:08:18 np0005543227 certmonger[48311]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:08:18 np0005543227 certmonger[48311]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:08:18 np0005543227 certmonger[48311]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:08:18 np0005543227 certmonger[48311]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:08:18 np0005543227 certmonger[48311]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:08:18 np0005543227 certmonger[48311]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJ+xdouBS6+FSplg5ulqeRPX Dec 3 08:08:18 np0005543227 certmonger[48311]: j4DhMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:08:18 np0005543227 certmonger[48311]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:08:18 np0005543227 certmonger[48311]: AgOgMgwwcmVkaXMvbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:08:18 np0005543227 certmonger[48311]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy Dec 3 08:08:18 np0005543227 certmonger[48311]: ZWRpcxshbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:08:18 np0005543227 certmonger[48311]: DQEBCwUAA4IBgQAOE2LvsmZKwk/nVNEUQAwcIyhSwhdYgMy8ZJLfReHfFnZKFy8h Dec 3 08:08:18 np0005543227 certmonger[48311]: 2W9iR0K6NsYNrWNi8LcOJPxWoBSVhq9atRS8tK8MBJIKoBXQHCE5FrC+4KFtgzGJ Dec 3 08:08:18 np0005543227 certmonger[48311]: JH3ziRc/gIRWWwgGiEKNzwyUqA2L1BNh9RmluOMVTia7t4EWrtnrmbaDaU/kJj1T Dec 3 08:08:18 np0005543227 certmonger[48311]: boeKtMSpf4Ixs8yVmyoenFWLgzQx0uORWi6g/79qLjaN/VhAHDYsjQA0LvGKy1C0 Dec 3 08:08:18 np0005543227 certmonger[48311]: 3XmhgwPVItg9vAp5b1B1Sc9pmW49lnnMUS9qwaI7YjRIO24O8E+bzsMQ6vYcxB1b Dec 3 08:08:18 np0005543227 certmonger[48311]: dzeltGl44+0/Aga9l4DwEJNWxjYyGEtzG3UDxMFNaJRaLYAWlbStTnXDEiFqmYXh Dec 3 08:08:18 np0005543227 certmonger[48311]: +IcQM2Ys8lTkZ5liSy0Km/du77f8Syj4CQbX9mqdesAd9lTjhbgKpxpz5KGv0GZt Dec 3 08:08:18 np0005543227 certmonger[48311]: MFRpSrbYnwWENnLWYtSMPnJgJWA3Bw3cHeqN8OCHYz7ur1F8GR708lBllcFgA7Fg Dec 3 08:08:18 np0005543227 certmonger[48311]: ORN03ew2QAC/Jeg= Dec 3 08:08:18 np0005543227 certmonger[48311]: -----END CERTIFICATE----- Dec 3 08:08:18 np0005543227 certmonger[48311]: ". Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Certificate submission still ongoing. Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Certificate submission postprocessing complete. Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Child status = 0. Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Child output: Dec 3 08:08:18 np0005543227 certmonger[38965]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nORN03ew2QAC/Jeg=\n-----END CERTIFICATE-----\n","key_checked":true} Dec 3 08:08:18 np0005543227 certmonger[38965]: " Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Issued certificate is "-----BEGIN CERTIFICATE----- Dec 3 08:08:18 np0005543227 certmonger[38965]: MIIFdzCCA9+gAwIBAgIBSzANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Dec 3 08:08:18 np0005543227 certmonger[38965]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTIwMzA4 Dec 3 08:08:18 np0005543227 certmonger[38965]: MDgxOFoXDTI3MTIwNDA4MDgxOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Dec 3 08:08:18 np0005543227 certmonger[38965]: BAMMIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Dec 3 08:08:18 np0005543227 certmonger[38965]: hvcNAQEBBQADggEPADCCAQoCggEBAL7dn7xbu53gJrIkNYRic6uZu1cMmaVkH6ON Dec 3 08:08:18 np0005543227 certmonger[38965]: fbn2KWDlZYkFqVl6+Yq/nM49gkEu1HDC7K10oZ9gEDrtfEX8GEyFZ4gcIOnI7QEL Dec 3 08:08:18 np0005543227 certmonger[38965]: f9upys5PZ+1y9vKZiUrTYKq9UZRifoxEgAVvXWVp6Eo5EzdvIGEdwxQnm13l5gau Dec 3 08:08:18 np0005543227 certmonger[38965]: MC6SviCbPYtZRHKf0JnB0+HmOBan+S4SVHc6TUnh9lgUwdO5VnYPMTYhqyGEOM4s Dec 3 08:08:18 np0005543227 certmonger[38965]: Whf5s9I+VStCwpr1X0aglyOnFg653xT3gkrwWQ//tXcpAc/sOsTuelo8tCah0Abi Dec 3 08:08:18 np0005543227 certmonger[38965]: c6ibrsYfNhzfvzs/PPbjRpw0USagiUTMDbTqRvzJeRIGMyidQDsCAwEAAaOCAggw Dec 3 08:08:18 np0005543227 certmonger[38965]: ggIEMB8GA1UdIwQYMBaAFILPpiBvzmHJSL7aZNFKn92Lq+15MDoGCCsGAQUFBwEB Dec 3 08:08:18 np0005543227 certmonger[38965]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Dec 3 08:08:18 np0005543227 certmonger[38965]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Dec 3 08:08:18 np0005543227 certmonger[38965]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Dec 3 08:08:18 np0005543227 certmonger[38965]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Dec 3 08:08:18 np0005543227 certmonger[38965]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFJ+xdouBS6+FSplg5ulqeRPX Dec 3 08:08:18 np0005543227 certmonger[38965]: j4DhMIHhBgNVHREEgdkwgdaCIW5wMDAwNTU0MzIyNy5pbnRlcm5hbGFwaS5vb28u Dec 3 08:08:18 np0005543227 certmonger[38965]: dGVzdIIeb3ZlcmNsb3VkLmludGVybmFsYXBpLm9vby50ZXN0oEAGCisGAQQBgjcU Dec 3 08:08:18 np0005543227 certmonger[38965]: AgOgMgwwcmVkaXMvbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0QE9P Dec 3 08:08:18 np0005543227 certmonger[38965]: Ty5URVNUoE8GBisGAQUCAqBFMEOgChsIT09PLlRFU1ShNTAzoAMCAQGhLDAqGwVy Dec 3 08:08:18 np0005543227 certmonger[38965]: ZWRpcxshbnAwMDA1NTQzMjI3LmludGVybmFsYXBpLm9vby50ZXN0MA0GCSqGSIb3 Dec 3 08:08:18 np0005543227 certmonger[38965]: DQEBCwUAA4IBgQAOE2LvsmZKwk/nVNEUQAwcIyhSwhdYgMy8ZJLfReHfFnZKFy8h Dec 3 08:08:18 np0005543227 certmonger[38965]: 2W9iR0K6NsYNrWNi8LcOJPxWoBSVhq9atRS8tK8MBJIKoBXQHCE5FrC+4KFtgzGJ Dec 3 08:08:18 np0005543227 certmonger[38965]: JH3ziRc/gIRWWwgGiEKNzwyUqA2L1BNh9RmluOMVTia7t4EWrtnrmbaDaU/kJj1T Dec 3 08:08:18 np0005543227 certmonger[38965]: boeKtMSpf4Ixs8yVmyoenFWLgzQx0uORWi6g/79qLjaN/VhAHDYsjQA0LvGKy1C0 Dec 3 08:08:18 np0005543227 certmonger[38965]: 3XmhgwPVItg9vAp5b1B1Sc9pmW49lnnMUS9qwaI7YjRIO24O8E+bzsMQ6vYcxB1b Dec 3 08:08:18 np0005543227 certmonger[38965]: dzeltGl44+0/Aga9l4DwEJNWxjYyGEtzG3UDxMFNaJRaLYAWlbStTnXDEiFqmYXh Dec 3 08:08:18 np0005543227 certmonger[38965]: +IcQM2Ys8lTkZ5liSy0Km/du77f8Syj4CQbX9mqdesAd9lTjhbgKpxpz5KGv0GZt Dec 3 08:08:18 np0005543227 certmonger[38965]: MFRpSrbYnwWENnLWYtSMPnJgJWA3Bw3cHeqN8OCHYz7ur1F8GR708lBllcFgA7Fg Dec 3 08:08:18 np0005543227 certmonger[38965]: ORN03ew2QAC/Jeg= Dec 3 08:08:18 np0005543227 certmonger[38965]: -----END CERTIFICATE----- Dec 3 08:08:18 np0005543227 certmonger[38965]: ". Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Certificate issued (0 chain certificates, 0 roots). Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] No hooks set for pre-save command. Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:18 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:18 np0005543227 certmonger[48387]: Certificate in file "/etc/pki/tls/certs/redis.crt" issued by CA and saved. Dec 3 08:08:18 np0005543227 certmonger[38965]: 2025-12-03 08:08:18 [38965] Wrote to /var/lib/certmonger/requests/20251203080817 Dec 3 08:08:19 np0005543227 python3[48403]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:08:19 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:21 np0005543227 podman[48404]: 2025-12-03 08:08:19.412284307 +0000 UTC m=+0.046962070 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 08:08:21 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:21 np0005543227 python3[48457]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 cluster.common.tag/redis:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:08:21 np0005543227 podman[48458]: 2025-12-03 08:08:21.726888415 +0000 UTC m=+0.049028239 image tag b9d7c6447d3e11e4b7bc4c1a8872a5471a9020b0347f9e0a44060d9b2823bfe3 cluster.common.tag/redis:pcmklatest Dec 3 08:08:21 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 08:08:22 np0005543227 python3[48484]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 08:08:22 np0005543227 python3[48533]: ansible-ansible.legacy.stat Invoked with path=/etc/rsyslog.d/openstack-swift.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 08:08:23 np0005543227 python3[48576]: ansible-ansible.legacy.copy Invoked with dest=/etc/rsyslog.d/openstack-swift.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764749302.3449721-115874-266532735873410/source _original_basename=tmpd4ckvklr follow=False checksum=c046f7cecbacf1ea879045a0e157e300a2726c73 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 08:08:23 np0005543227 python3[48606]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Dec 3 08:08:23 np0005543227 systemd[1]: Stopping System Logging Service... Dec 3 08:08:24 np0005543227 rsyslogd[40147]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40147" x-info="https://www.rsyslog.com"] exiting on signal 15. Dec 3 08:08:24 np0005543227 systemd[1]: rsyslog.service: Deactivated successfully. Dec 3 08:08:24 np0005543227 systemd[1]: Stopped System Logging Service. Dec 3 08:08:24 np0005543227 systemd[1]: Starting System Logging Service... Dec 3 08:08:24 np0005543227 rsyslogd[48609]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="48609" x-info="https://www.rsyslog.com"] start Dec 3 08:08:24 np0005543227 systemd[1]: Started System Logging Service. Dec 3 08:08:24 np0005543227 rsyslogd[48609]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 08:08:24 np0005543227 python3[48628]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 08:08:26 np0005543227 ansible-async_wrapper.py[48800]: Invoked with 816055272024 3600 /home/tripleo-admin/.ansible/tmp/ansible-tmp-1764749305.5606718-116000-226525594071305/AnsiballZ_command.py _ Dec 3 08:08:26 np0005543227 ansible-async_wrapper.py[48803]: Starting module and watcher Dec 3 08:08:26 np0005543227 ansible-async_wrapper.py[48803]: Start watching 48804 (3600) Dec 3 08:08:26 np0005543227 ansible-async_wrapper.py[48804]: Start module (48804) Dec 3 08:08:26 np0005543227 ansible-async_wrapper.py[48800]: Return async_wrapper task started. Dec 3 08:08:26 np0005543227 python3[48824]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:08:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3600) Dec 3 08:08:32 np0005543227 puppet-user[48810]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 08:08:32 np0005543227 puppet-user[48810]: (file: /etc/puppet/hiera.yaml) Dec 3 08:08:32 np0005543227 puppet-user[48810]: Warning: Undefined variable '::deploy_config_name'; Dec 3 08:08:32 np0005543227 puppet-user[48810]: (file & line not available) Dec 3 08:08:32 np0005543227 puppet-user[48810]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 08:08:32 np0005543227 puppet-user[48810]: (file & line not available) Dec 3 08:08:32 np0005543227 puppet-user[48810]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/database/mysql/client.pp, line: 89, column: 8) Dec 3 08:08:32 np0005543227 puppet-user[48810]: Warning: Unknown variable: '::deployment_type'. (file: /etc/puppet/modules/tripleo/manifests/packages.pp, line: 39, column: 69) Dec 3 08:08:32 np0005543227 puppet-user[48810]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.40 seconds Dec 3 08:08:32 np0005543227 sssd_nss[38664]: Enumeration requested but not enabled Dec 3 08:08:32 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Exec[directory-create-etc-my.cnf.d]/returns: executed successfully Dec 3 08:08:32 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 08:08:32 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 08:08:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3595) Dec 3 08:08:36 np0005543227 python3[48965]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:08:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3590) Dec 3 08:08:42 np0005543227 dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Dec 3 08:08:43 np0005543227 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 08:08:43 np0005543227 systemd[1]: Starting man-db-cache-update.service... Dec 3 08:08:43 np0005543227 systemd[1]: Reloading. Dec 3 08:08:43 np0005543227 systemd-rc-local-generator[49150]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:43 np0005543227 systemd-sysv-generator[49159]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:43 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:43 np0005543227 systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 08:08:45 np0005543227 systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 08:08:45 np0005543227 systemd[1]: Finished man-db-cache-update.service. Dec 3 08:08:45 np0005543227 systemd[1]: man-db-cache-update.service: Consumed 1.803s CPU time. Dec 3 08:08:45 np0005543227 systemd[1]: run-r9b9f77c6a82b46d7b6c44d8584ba24ab.service: Deactivated successfully. Dec 3 08:08:45 np0005543227 rhsm-service[6608]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Dec 3 08:08:45 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Pacemaker::Install/Package[pacemaker]/ensure: created Dec 3 08:08:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3585) Dec 3 08:08:47 np0005543227 python3[50851]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:08:51 np0005543227 systemd[1]: Reloading. Dec 3 08:08:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3580) Dec 3 08:08:51 np0005543227 systemd-rc-local-generator[50897]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:51 np0005543227 systemd-sysv-generator[50902]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:51 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:51 np0005543227 systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Dec 3 08:08:51 np0005543227 systemd[1]: Starting man-db-cache-update.service... Dec 3 08:08:51 np0005543227 systemd[1]: Reloading. Dec 3 08:08:51 np0005543227 systemd-rc-local-generator[50958]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:51 np0005543227 systemd-sysv-generator[50964]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:51 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:51 np0005543227 systemd[1]: Queuing reload/restart jobs for marked units… Dec 3 08:08:52 np0005543227 systemd[1]: man-db-cache-update.service: Deactivated successfully. Dec 3 08:08:52 np0005543227 systemd[1]: Finished man-db-cache-update.service. Dec 3 08:08:52 np0005543227 systemd[1]: run-r988a290b054e4b93beb6c4adb701c98b.service: Deactivated successfully. Dec 3 08:08:52 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Pacemaker::Install/Package[pcs]/ensure: created Dec 3 08:08:53 np0005543227 systemd[1]: Reloading. Dec 3 08:08:53 np0005543227 systemd-sysv-generator[51073]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:53 np0005543227 systemd-rc-local-generator[51070]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:53 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:53 np0005543227 systemd[1]: Reloading. Dec 3 08:08:53 np0005543227 systemd-rc-local-generator[51106]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:53 np0005543227 systemd-sysv-generator[51111]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:53 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:53 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Pacemaker::Service/Service[corosync]/enable: enable changed 'false' to 'true' Dec 3 08:08:53 np0005543227 systemd[1]: Reloading. Dec 3 08:08:53 np0005543227 systemd-rc-local-generator[51142]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:53 np0005543227 systemd-sysv-generator[51146]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:53 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:53 np0005543227 systemd[1]: Reloading. Dec 3 08:08:53 np0005543227 systemd-rc-local-generator[51182]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:53 np0005543227 systemd-sysv-generator[51186]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:53 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:54 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Pacemaker::Service/Service[pacemaker]/enable: enable changed 'false' to 'true' Dec 3 08:08:54 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Pacemaker::Corosync/File_line[pcsd_bind_addr]/ensure: created Dec 3 08:08:54 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/password: changed [redacted] to [redacted] Dec 3 08:08:54 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Pacemaker::Corosync/User[hacluster]/groups: groups changed to ['haclient'] Dec 3 08:08:54 np0005543227 systemd[1]: Reloading. Dec 3 08:08:54 np0005543227 systemd-sysv-generator[51236]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:54 np0005543227 systemd-rc-local-generator[51233]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:54 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:55 np0005543227 systemd[1]: Starting PCS GUI and remote configuration interface (Ruby)... Dec 3 08:08:55 np0005543227 pcsd[51246]: 2025-12-03 08:08:55 +0000 INFO Notifying systemd we are running (socket /run/systemd/notify) Dec 3 08:08:55 np0005543227 systemd[1]: Started PCS GUI and remote configuration interface (Ruby). Dec 3 08:08:55 np0005543227 systemd[1]: Starting PCS GUI and remote configuration interface... Dec 3 08:08:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3575) Dec 3 08:08:57 np0005543227 python3[51341]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:08:57 np0005543227 systemd[1]: Started PCS GUI and remote configuration interface. Dec 3 08:08:57 np0005543227 systemd[1]: Reloading. Dec 3 08:08:57 np0005543227 systemd-rc-local-generator[51383]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:57 np0005543227 systemd-sysv-generator[51387]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:57 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:57 np0005543227 systemd[1]: Reloading. Dec 3 08:08:57 np0005543227 systemd-sysv-generator[51432]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 08:08:57 np0005543227 systemd-rc-local-generator[51427]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 08:08:57 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 08:08:57 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Pacemaker::Service/Service[pcsd]/ensure: ensure changed 'stopped' to 'running' Dec 3 08:08:58 np0005543227 puppet-user[48810]: Notice: /Stage[main]/Pacemaker::Corosync/Exec[check-for-local-authentication]/returns: executed successfully Dec 3 08:09:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3570) Dec 3 08:09:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3565) Dec 3 08:09:07 np0005543227 python3[51476]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3560) Dec 3 08:09:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3555) Dec 3 08:09:18 np0005543227 python3[51509]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3550) Dec 3 08:09:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3545) Dec 3 08:09:28 np0005543227 python3[51542]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3540) Dec 3 08:09:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3535) Dec 3 08:09:38 np0005543227 python3[51575]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3530) Dec 3 08:09:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3525) Dec 3 08:09:48 np0005543227 python3[51608]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:09:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3520) Dec 3 08:09:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3515) Dec 3 08:09:59 np0005543227 python3[51641]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3510) Dec 3 08:10:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3505) Dec 3 08:10:09 np0005543227 python3[51674]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3500) Dec 3 08:10:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3495) Dec 3 08:10:19 np0005543227 python3[51707]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3490) Dec 3 08:10:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3485) Dec 3 08:10:30 np0005543227 python3[51740]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3480) Dec 3 08:10:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3475) Dec 3 08:10:40 np0005543227 python3[51770]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3470) Dec 3 08:10:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3465) Dec 3 08:10:50 np0005543227 python3[51800]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:10:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3460) Dec 3 08:10:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3455) Dec 3 08:11:00 np0005543227 python3[51823]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3450) Dec 3 08:11:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3445) Dec 3 08:11:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3440) Dec 3 08:11:11 np0005543227 python3[51855]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3435) Dec 3 08:11:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3430) Dec 3 08:11:21 np0005543227 python3[51888]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3425) Dec 3 08:11:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3420) Dec 3 08:11:31 np0005543227 python3[51921]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3415) Dec 3 08:11:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3410) Dec 3 08:11:42 np0005543227 python3[51954]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3405) Dec 3 08:11:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3400) Dec 3 08:11:52 np0005543227 python3[51987]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:11:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3395) Dec 3 08:12:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3390) Dec 3 08:12:02 np0005543227 python3[52020]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3385) Dec 3 08:12:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3380) Dec 3 08:12:13 np0005543227 python3[52053]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3375) Dec 3 08:12:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3370) Dec 3 08:12:23 np0005543227 python3[52086]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3365) Dec 3 08:12:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3360) Dec 3 08:12:33 np0005543227 python3[52120]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3355) Dec 3 08:12:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3350) Dec 3 08:12:44 np0005543227 python3[52153]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3345) Dec 3 08:12:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3340) Dec 3 08:12:54 np0005543227 python3[52183]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:12:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3335) Dec 3 08:13:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3330) Dec 3 08:13:04 np0005543227 python3[52215]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3325) Dec 3 08:13:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3320) Dec 3 08:13:15 np0005543227 python3[52237]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3315) Dec 3 08:13:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3310) Dec 3 08:13:25 np0005543227 python3[52268]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3305) Dec 3 08:13:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3300) Dec 3 08:13:35 np0005543227 python3[52301]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3295) Dec 3 08:13:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3290) Dec 3 08:13:45 np0005543227 python3[52334]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3285) Dec 3 08:13:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3280) Dec 3 08:13:56 np0005543227 python3[52367]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:13:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3275) Dec 3 08:14:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3270) Dec 3 08:14:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3265) Dec 3 08:14:06 np0005543227 python3[52400]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3260) Dec 3 08:14:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3255) Dec 3 08:14:16 np0005543227 python3[52433]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3250) Dec 3 08:14:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3245) Dec 3 08:14:27 np0005543227 python3[52466]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3240) Dec 3 08:14:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3235) Dec 3 08:14:37 np0005543227 python3[52499]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3230) Dec 3 08:14:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3225) Dec 3 08:14:47 np0005543227 python3[52533]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:14:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3220) Dec 3 08:14:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3215) Dec 3 08:14:58 np0005543227 python3[52566]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3210) Dec 3 08:15:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3205) Dec 3 08:15:08 np0005543227 python3[52596]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3200) Dec 3 08:15:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3195) Dec 3 08:15:18 np0005543227 python3[52626]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3190) Dec 3 08:15:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3185) Dec 3 08:15:28 np0005543227 python3[52651]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3180) Dec 3 08:15:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3175) Dec 3 08:15:39 np0005543227 python3[52682]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3170) Dec 3 08:15:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3165) Dec 3 08:15:49 np0005543227 python3[52715]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:15:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3160) Dec 3 08:15:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3155) Dec 3 08:15:59 np0005543227 python3[52748]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3150) Dec 3 08:16:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3145) Dec 3 08:16:10 np0005543227 python3[52781]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3140) Dec 3 08:16:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3135) Dec 3 08:16:20 np0005543227 python3[52814]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3130) Dec 3 08:16:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3125) Dec 3 08:16:30 np0005543227 python3[52847]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3120) Dec 3 08:16:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3115) Dec 3 08:16:41 np0005543227 python3[52881]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3110) Dec 3 08:16:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3105) Dec 3 08:16:51 np0005543227 python3[52914]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:16:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3100) Dec 3 08:16:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3095) Dec 3 08:17:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3090) Dec 3 08:17:01 np0005543227 python3[52947]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3085) Dec 3 08:17:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3080) Dec 3 08:17:12 np0005543227 python3[52980]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3075) Dec 3 08:17:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3070) Dec 3 08:17:22 np0005543227 python3[53010]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3065) Dec 3 08:17:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3060) Dec 3 08:17:32 np0005543227 python3[53033]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3055) Dec 3 08:17:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3050) Dec 3 08:17:42 np0005543227 python3[53062]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3045) Dec 3 08:17:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3040) Dec 3 08:17:53 np0005543227 python3[53095]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:17:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3035) Dec 3 08:18:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3030) Dec 3 08:18:03 np0005543227 python3[53129]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3025) Dec 3 08:18:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3020) Dec 3 08:18:13 np0005543227 python3[53162]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3015) Dec 3 08:18:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3010) Dec 3 08:18:24 np0005543227 python3[53195]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3005) Dec 3 08:18:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (3000) Dec 3 08:18:34 np0005543227 python3[53228]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2995) Dec 3 08:18:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2990) Dec 3 08:18:44 np0005543227 python3[53261]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2985) Dec 3 08:18:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2980) Dec 3 08:18:55 np0005543227 python3[53294]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:18:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2975) Dec 3 08:19:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2970) Dec 3 08:19:05 np0005543227 python3[53327]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2965) Dec 3 08:19:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2960) Dec 3 08:19:15 np0005543227 python3[53360]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2955) Dec 3 08:19:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2950) Dec 3 08:19:26 np0005543227 python3[53393]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2945) Dec 3 08:19:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2940) Dec 3 08:19:36 np0005543227 python3[53424]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2935) Dec 3 08:19:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2930) Dec 3 08:19:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2925) Dec 3 08:19:46 np0005543227 python3[53446]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:19:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2920) Dec 3 08:19:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2915) Dec 3 08:19:57 np0005543227 python3[53475]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2910) Dec 3 08:20:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2905) Dec 3 08:20:07 np0005543227 python3[53508]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2900) Dec 3 08:20:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2895) Dec 3 08:20:17 np0005543227 python3[53542]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2890) Dec 3 08:20:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2885) Dec 3 08:20:28 np0005543227 python3[53575]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2880) Dec 3 08:20:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2875) Dec 3 08:20:38 np0005543227 python3[53608]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2870) Dec 3 08:20:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2865) Dec 3 08:20:48 np0005543227 python3[53641]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:20:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2860) Dec 3 08:20:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2855) Dec 3 08:20:59 np0005543227 python3[53674]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2850) Dec 3 08:21:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2845) Dec 3 08:21:09 np0005543227 python3[53708]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2840) Dec 3 08:21:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2835) Dec 3 08:21:19 np0005543227 python3[53741]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2830) Dec 3 08:21:26 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2825) Dec 3 08:21:29 np0005543227 python3[53774]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:31 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2820) Dec 3 08:21:36 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2815) Dec 3 08:21:40 np0005543227 python3[53807]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:41 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2810) Dec 3 08:21:46 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2805) Dec 3 08:21:50 np0005543227 python3[53840]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:21:51 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2800) Dec 3 08:21:56 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2795) Dec 3 08:22:00 np0005543227 python3[53859]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:01 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2790) Dec 3 08:22:06 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2785) Dec 3 08:22:11 np0005543227 python3[53889]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:11 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2780) Dec 3 08:22:16 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2775) Dec 3 08:22:21 np0005543227 python3[53922]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:21 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2770) Dec 3 08:22:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2765) Dec 3 08:22:31 np0005543227 python3[53955]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2760) Dec 3 08:22:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2755) Dec 3 08:22:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2750) Dec 3 08:22:42 np0005543227 python3[53988]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2745) Dec 3 08:22:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2740) Dec 3 08:22:52 np0005543227 python3[54021]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:22:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2735) Dec 3 08:22:59 np0005543227 sshd[54039]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:23:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2730) Dec 3 08:23:02 np0005543227 python3[54057]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2725) Dec 3 08:23:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2720) Dec 3 08:23:12 np0005543227 python3[54092]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2715) Dec 3 08:23:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2710) Dec 3 08:23:23 np0005543227 python3[54125]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2705) Dec 3 08:23:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2700) Dec 3 08:23:33 np0005543227 python3[54160]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2695) Dec 3 08:23:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2690) Dec 3 08:23:43 np0005543227 python3[54193]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2685) Dec 3 08:23:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2680) Dec 3 08:23:54 np0005543227 python3[54226]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:23:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2675) Dec 3 08:24:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2670) Dec 3 08:24:04 np0005543227 python3[54246]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2665) Dec 3 08:24:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2660) Dec 3 08:24:14 np0005543227 python3[54275]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2655) Dec 3 08:24:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2650) Dec 3 08:24:25 np0005543227 python3[54308]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2645) Dec 3 08:24:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2640) Dec 3 08:24:35 np0005543227 python3[54341]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2635) Dec 3 08:24:38 np0005543227 sshd[54359]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:24:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2630) Dec 3 08:24:44 np0005543227 sshd[54364]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:24:44 np0005543227 systemd[1]: session-15.scope: Deactivated successfully. Dec 3 08:24:44 np0005543227 systemd[1]: session-15.scope: Consumed 2.978s CPU time. Dec 3 08:24:44 np0005543227 systemd-logind[36401]: Session 15 logged out. Waiting for processes to exit. Dec 3 08:24:44 np0005543227 systemd-logind[36401]: Removed session 15. Dec 3 08:24:45 np0005543227 python3[54385]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2625) Dec 3 08:24:51 np0005543227 sshd[54405]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:24:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2620) Dec 3 08:24:54 np0005543227 systemd[1]: Stopping User Manager for UID 1000... Dec 3 08:24:54 np0005543227 systemd[4176]: Activating special unit Exit the Session... Dec 3 08:24:54 np0005543227 systemd[4176]: Stopping podman-pause-50a92e44.scope... Dec 3 08:24:54 np0005543227 systemd[4176]: Removed slice User Background Tasks Slice. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped target Main User Target. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped target Basic System. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped target Paths. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped target Sockets. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped target Timers. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped Mark boot as successful after the user session has run 2 minutes. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped Daily Cleanup of User's Temporary Directories. Dec 3 08:24:54 np0005543227 dbus-broker[18561]: Dispatched 3266 messages @ 1(±16)μs / message. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopping D-Bus User Message Bus... Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped Create User's Volatile Files and Directories. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped podman-pause-50a92e44.scope. Dec 3 08:24:54 np0005543227 systemd[4176]: Removed slice Slice /user. Dec 3 08:24:54 np0005543227 systemd[4176]: Stopped D-Bus User Message Bus. Dec 3 08:24:54 np0005543227 systemd[4176]: Closed D-Bus User Message Bus Socket. Dec 3 08:24:54 np0005543227 systemd[4176]: Removed slice User Application Slice. Dec 3 08:24:54 np0005543227 systemd[4176]: Reached target Shutdown. Dec 3 08:24:54 np0005543227 systemd[4176]: Finished Exit the Session. Dec 3 08:24:54 np0005543227 systemd[4176]: Reached target Exit the Session. Dec 3 08:24:54 np0005543227 systemd[1]: user@1000.service: Deactivated successfully. Dec 3 08:24:54 np0005543227 systemd[1]: Stopped User Manager for UID 1000. Dec 3 08:24:54 np0005543227 systemd[1]: user@1000.service: Consumed 1.594s CPU time, read 20.0K from disk, written 4.0K to disk. Dec 3 08:24:55 np0005543227 python3[54425]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:24:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2615) Dec 3 08:24:57 np0005543227 sshd[54426]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:25:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2610) Dec 3 08:25:06 np0005543227 python3[54463]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2605) Dec 3 08:25:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2600) Dec 3 08:25:16 np0005543227 python3[54496]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2595) Dec 3 08:25:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2590) Dec 3 08:25:26 np0005543227 python3[54529]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2585) Dec 3 08:25:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2580) Dec 3 08:25:37 np0005543227 python3[54562]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2575) Dec 3 08:25:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2570) Dec 3 08:25:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2565) Dec 3 08:25:47 np0005543227 python3[54595]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:25:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2560) Dec 3 08:25:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2555) Dec 3 08:25:57 np0005543227 python3[54628]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2550) Dec 3 08:26:04 np0005543227 sshd[54629]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:26:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2545) Dec 3 08:26:08 np0005543227 python3[54665]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:10 np0005543227 sshd[54667]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:26:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2540) Dec 3 08:26:16 np0005543227 sshd[54672]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:26:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2535) Dec 3 08:26:18 np0005543227 python3[54691]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2530) Dec 3 08:26:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2525) Dec 3 08:26:28 np0005543227 python3[54725]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2520) Dec 3 08:26:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2515) Dec 3 08:26:38 np0005543227 python3[54758]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2510) Dec 3 08:26:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2505) Dec 3 08:26:49 np0005543227 python3[54791]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:26:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2500) Dec 3 08:26:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2495) Dec 3 08:26:59 np0005543227 python3[54824]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2490) Dec 3 08:27:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2485) Dec 3 08:27:09 np0005543227 python3[54857]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2480) Dec 3 08:27:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2475) Dec 3 08:27:20 np0005543227 python3[54890]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2470) Dec 3 08:27:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2465) Dec 3 08:27:30 np0005543227 python3[54923]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2460) Dec 3 08:27:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2455) Dec 3 08:27:40 np0005543227 python3[54956]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2450) Dec 3 08:27:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2445) Dec 3 08:27:51 np0005543227 python3[54989]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:27:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2440) Dec 3 08:27:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2435) Dec 3 08:28:01 np0005543227 python3[55022]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2430) Dec 3 08:28:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2425) Dec 3 08:28:11 np0005543227 python3[55055]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2420) Dec 3 08:28:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2415) Dec 3 08:28:21 np0005543227 python3[55088]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2410) Dec 3 08:28:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2405) Dec 3 08:28:32 np0005543227 python3[55106]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2400) Dec 3 08:28:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2395) Dec 3 08:28:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2390) Dec 3 08:28:42 np0005543227 python3[55137]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2385) Dec 3 08:28:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2380) Dec 3 08:28:52 np0005543227 python3[55170]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:28:55 np0005543227 sshd[55189]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:28:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2375) Dec 3 08:29:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2370) Dec 3 08:29:03 np0005543227 python3[55205]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2365) Dec 3 08:29:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2360) Dec 3 08:29:13 np0005543227 python3[55238]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2355) Dec 3 08:29:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2350) Dec 3 08:29:23 np0005543227 python3[55271]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2345) Dec 3 08:29:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2340) Dec 3 08:29:34 np0005543227 python3[55304]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2335) Dec 3 08:29:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2330) Dec 3 08:29:44 np0005543227 python3[55337]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2325) Dec 3 08:29:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2320) Dec 3 08:29:54 np0005543227 python3[55370]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:29:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2315) Dec 3 08:30:02 np0005543227 sshd[55376]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:30:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2310) Dec 3 08:30:05 np0005543227 python3[55404]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2305) Dec 3 08:30:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2300) Dec 3 08:30:15 np0005543227 python3[55437]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2295) Dec 3 08:30:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2290) Dec 3 08:30:23 np0005543227 sshd[55440]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:30:25 np0005543227 python3[55473]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2285) Dec 3 08:30:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2280) Dec 3 08:30:34 np0005543227 sshd[55474]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:30:34 np0005543227 sshd[55475]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:30:34 np0005543227 sshd[55476]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:30:35 np0005543227 python3[55508]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2275) Dec 3 08:30:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2270) Dec 3 08:30:46 np0005543227 python3[55527]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2265) Dec 3 08:30:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2260) Dec 3 08:30:56 np0005543227 python3[55558]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:30:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2255) Dec 3 08:31:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2250) Dec 3 08:31:06 np0005543227 python3[55591]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2245) Dec 3 08:31:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2240) Dec 3 08:31:17 np0005543227 python3[55624]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2235) Dec 3 08:31:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2230) Dec 3 08:31:27 np0005543227 python3[55657]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2225) Dec 3 08:31:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2220) Dec 3 08:31:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2215) Dec 3 08:31:37 np0005543227 python3[55690]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2210) Dec 3 08:31:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2205) Dec 3 08:31:48 np0005543227 python3[55723]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:31:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2200) Dec 3 08:31:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2195) Dec 3 08:31:58 np0005543227 python3[55756]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2190) Dec 3 08:32:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2185) Dec 3 08:32:08 np0005543227 python3[55789]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2180) Dec 3 08:32:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2175) Dec 3 08:32:19 np0005543227 python3[55822]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2170) Dec 3 08:32:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2165) Dec 3 08:32:29 np0005543227 python3[55855]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2160) Dec 3 08:32:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2155) Dec 3 08:32:39 np0005543227 python3[55888]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2150) Dec 3 08:32:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2145) Dec 3 08:32:49 np0005543227 python3[55915]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:32:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2140) Dec 3 08:32:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2135) Dec 3 08:33:00 np0005543227 python3[55939]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2130) Dec 3 08:33:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2125) Dec 3 08:33:10 np0005543227 python3[55970]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2120) Dec 3 08:33:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2115) Dec 3 08:33:20 np0005543227 python3[56003]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2110) Dec 3 08:33:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2105) Dec 3 08:33:31 np0005543227 python3[56036]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2100) Dec 3 08:33:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2095) Dec 3 08:33:41 np0005543227 python3[56070]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2090) Dec 3 08:33:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2085) Dec 3 08:33:51 np0005543227 python3[56103]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:33:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2080) Dec 3 08:33:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2075) Dec 3 08:34:02 np0005543227 python3[56136]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2070) Dec 3 08:34:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2065) Dec 3 08:34:12 np0005543227 python3[56169]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2060) Dec 3 08:34:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2055) Dec 3 08:34:22 np0005543227 python3[56202]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2050) Dec 3 08:34:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2045) Dec 3 08:34:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2040) Dec 3 08:34:33 np0005543227 python3[56236]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2035) Dec 3 08:34:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2030) Dec 3 08:34:43 np0005543227 python3[56269]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2025) Dec 3 08:34:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2020) Dec 3 08:34:53 np0005543227 python3[56302]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:34:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2015) Dec 3 08:35:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2010) Dec 3 08:35:03 np0005543227 python3[56332]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2005) Dec 3 08:35:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (2000) Dec 3 08:35:14 np0005543227 python3[56353]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1995) Dec 3 08:35:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1990) Dec 3 08:35:24 np0005543227 python3[56384]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1985) Dec 3 08:35:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1980) Dec 3 08:35:34 np0005543227 python3[56417]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1975) Dec 3 08:35:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1970) Dec 3 08:35:45 np0005543227 python3[56450]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1965) Dec 3 08:35:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1960) Dec 3 08:35:55 np0005543227 python3[56483]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:35:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1955) Dec 3 08:36:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1950) Dec 3 08:36:05 np0005543227 python3[56516]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1945) Dec 3 08:36:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1940) Dec 3 08:36:16 np0005543227 python3[56549]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1935) Dec 3 08:36:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1930) Dec 3 08:36:26 np0005543227 python3[56582]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1925) Dec 3 08:36:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1920) Dec 3 08:36:36 np0005543227 python3[56615]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1915) Dec 3 08:36:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1910) Dec 3 08:36:46 np0005543227 python3[56648]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1905) Dec 3 08:36:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1900) Dec 3 08:36:57 np0005543227 python3[56681]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:36:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1895) Dec 3 08:37:02 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1890) Dec 3 08:37:07 np0005543227 python3[56714]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:07 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1885) Dec 3 08:37:12 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1880) Dec 3 08:37:17 np0005543227 python3[56742]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:17 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1875) Dec 3 08:37:22 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1870) Dec 3 08:37:27 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1865) Dec 3 08:37:28 np0005543227 python3[56765]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:32 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1860) Dec 3 08:37:37 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1855) Dec 3 08:37:38 np0005543227 python3[56796]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:42 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1850) Dec 3 08:37:47 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1845) Dec 3 08:37:48 np0005543227 python3[56829]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:37:52 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1840) Dec 3 08:37:57 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1835) Dec 3 08:37:58 np0005543227 python3[56862]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1830) Dec 3 08:38:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1825) Dec 3 08:38:09 np0005543227 python3[56895]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1820) Dec 3 08:38:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1815) Dec 3 08:38:19 np0005543227 python3[56928]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1810) Dec 3 08:38:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1805) Dec 3 08:38:29 np0005543227 python3[56962]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1800) Dec 3 08:38:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1795) Dec 3 08:38:40 np0005543227 python3[56996]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1790) Dec 3 08:38:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1785) Dec 3 08:38:50 np0005543227 python3[57029]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:38:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1780) Dec 3 08:38:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1775) Dec 3 08:39:00 np0005543227 python3[57062]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1770) Dec 3 08:39:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1765) Dec 3 08:39:11 np0005543227 python3[57095]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1760) Dec 3 08:39:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1755) Dec 3 08:39:21 np0005543227 python3[57128]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1750) Dec 3 08:39:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1745) Dec 3 08:39:31 np0005543227 python3[57148]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1740) Dec 3 08:39:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1735) Dec 3 08:39:41 np0005543227 python3[57177]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1730) Dec 3 08:39:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1725) Dec 3 08:39:52 np0005543227 python3[57211]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:39:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1720) Dec 3 08:39:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1715) Dec 3 08:40:02 np0005543227 python3[57244]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1710) Dec 3 08:40:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1705) Dec 3 08:40:12 np0005543227 python3[57277]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1700) Dec 3 08:40:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1695) Dec 3 08:40:23 np0005543227 python3[57310]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1690) Dec 3 08:40:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1685) Dec 3 08:40:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1680) Dec 3 08:40:33 np0005543227 python3[57343]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1675) Dec 3 08:40:39 np0005543227 sshd[57361]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:40:42 np0005543227 sshd[57362]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:40:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1670) Dec 3 08:40:43 np0005543227 python3[57378]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1665) Dec 3 08:40:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1660) Dec 3 08:40:54 np0005543227 python3[57412]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:40:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1655) Dec 3 08:41:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1650) Dec 3 08:41:04 np0005543227 python3[57445]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1645) Dec 3 08:41:09 np0005543227 sshd[57446]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:41:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1640) Dec 3 08:41:14 np0005543227 python3[57480]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1635) Dec 3 08:41:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1630) Dec 3 08:41:24 np0005543227 python3[57513]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1625) Dec 3 08:41:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1620) Dec 3 08:41:35 np0005543227 python3[57543]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:36 np0005543227 sshd[57547]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:41:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1615) Dec 3 08:41:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1610) Dec 3 08:41:45 np0005543227 python3[57568]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1605) Dec 3 08:41:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1600) Dec 3 08:41:55 np0005543227 krb5_child[57584]: Preauthentication failed Dec 3 08:41:55 np0005543227 krb5_child[57584]: Preauthentication failed Dec 3 08:41:55 np0005543227 systemd[1]: Starting dnf makecache... Dec 3 08:41:55 np0005543227 python3[57601]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:41:55 np0005543227 dnf[57600]: Updating Subscription Management repositories. Dec 3 08:41:57 np0005543227 dnf[57600]: Metadata cache refreshed recently. Dec 3 08:41:57 np0005543227 systemd[1]: dnf-makecache.service: Deactivated successfully. Dec 3 08:41:57 np0005543227 systemd[1]: Finished dnf makecache. Dec 3 08:41:57 np0005543227 systemd[1]: dnf-makecache.service: Consumed 2.091s CPU time. Dec 3 08:41:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1595) Dec 3 08:42:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1590) Dec 3 08:42:03 np0005543227 sshd[57620]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:42:06 np0005543227 python3[57637]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1585) Dec 3 08:42:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1580) Dec 3 08:42:16 np0005543227 python3[57670]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1575) Dec 3 08:42:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1570) Dec 3 08:42:26 np0005543227 python3[57703]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1565) Dec 3 08:42:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1560) Dec 3 08:42:36 np0005543227 sshd[57738]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:42:37 np0005543227 python3[57737]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1555) Dec 3 08:42:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1550) Dec 3 08:42:47 np0005543227 python3[57772]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1545) Dec 3 08:42:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1540) Dec 3 08:42:56 np0005543227 sshd[57790]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:42:57 np0005543227 python3[57806]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:42:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1535) Dec 3 08:43:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1530) Dec 3 08:43:07 np0005543227 python3[57840]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1525) Dec 3 08:43:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1520) Dec 3 08:43:18 np0005543227 python3[57874]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1515) Dec 3 08:43:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1510) Dec 3 08:43:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1505) Dec 3 08:43:28 np0005543227 sshd[57908]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:43:28 np0005543227 python3[57907]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1500) Dec 3 08:43:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1495) Dec 3 08:43:38 np0005543227 python3[57942]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1490) Dec 3 08:43:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1485) Dec 3 08:43:49 np0005543227 python3[57972]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:43:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1480) Dec 3 08:43:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1475) Dec 3 08:43:59 np0005543227 python3[57993]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1470) Dec 3 08:44:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1465) Dec 3 08:44:09 np0005543227 python3[58024]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:09 np0005543227 sshd[58025]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:44:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1460) Dec 3 08:44:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1455) Dec 3 08:44:20 np0005543227 python3[58059]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1450) Dec 3 08:44:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1445) Dec 3 08:44:30 np0005543227 python3[58092]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1440) Dec 3 08:44:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1435) Dec 3 08:44:40 np0005543227 python3[58125]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1430) Dec 3 08:44:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1425) Dec 3 08:44:51 np0005543227 python3[58158]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:44:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1420) Dec 3 08:44:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1415) Dec 3 08:44:58 np0005543227 sshd[58176]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:45:01 np0005543227 python3[58192]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1410) Dec 3 08:45:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1405) Dec 3 08:45:11 np0005543227 python3[58227]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1400) Dec 3 08:45:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1395) Dec 3 08:45:21 np0005543227 python3[58260]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1390) Dec 3 08:45:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1385) Dec 3 08:45:32 np0005543227 python3[58293]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1380) Dec 3 08:45:35 np0005543227 sshd[58294]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:45:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1375) Dec 3 08:45:42 np0005543227 python3[58328]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1370) Dec 3 08:45:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1365) Dec 3 08:45:52 np0005543227 python3[58362]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:45:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1360) Dec 3 08:45:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1355) Dec 3 08:46:00 np0005543227 sshd[58363]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:46:03 np0005543227 python3[58394]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1350) Dec 3 08:46:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1345) Dec 3 08:46:13 np0005543227 python3[58416]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1340) Dec 3 08:46:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1335) Dec 3 08:46:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1330) Dec 3 08:46:23 np0005543227 python3[58446]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:24 np0005543227 krb5_child[58450]: Client's credentials have been revoked Dec 3 08:46:24 np0005543227 krb5_child[58450]: Client's credentials have been revoked Dec 3 08:46:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1325) Dec 3 08:46:30 np0005543227 sshd[58466]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:46:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1320) Dec 3 08:46:33 np0005543227 python3[58483]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1315) Dec 3 08:46:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1310) Dec 3 08:46:44 np0005543227 python3[58516]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1305) Dec 3 08:46:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1300) Dec 3 08:46:54 np0005543227 python3[58549]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:46:55 np0005543227 krb5_child[58551]: Client's credentials have been revoked Dec 3 08:46:55 np0005543227 krb5_child[58551]: Client's credentials have been revoked Dec 3 08:46:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1295) Dec 3 08:47:02 np0005543227 sshd[58570]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:47:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1290) Dec 3 08:47:04 np0005543227 python3[58587]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1285) Dec 3 08:47:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1280) Dec 3 08:47:15 np0005543227 python3[58620]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1275) Dec 3 08:47:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1270) Dec 3 08:47:25 np0005543227 python3[58653]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1265) Dec 3 08:47:28 np0005543227 sshd[58654]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:47:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1260) Dec 3 08:47:35 np0005543227 python3[58688]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1255) Dec 3 08:47:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1250) Dec 3 08:47:46 np0005543227 python3[58721]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1245) Dec 3 08:47:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1240) Dec 3 08:47:53 np0005543227 sshd[58726]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:47:56 np0005543227 python3[58755]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:47:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1235) Dec 3 08:48:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1230) Dec 3 08:48:06 np0005543227 python3[58786]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1225) Dec 3 08:48:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1220) Dec 3 08:48:16 np0005543227 python3[58819]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1215) Dec 3 08:48:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1210) Dec 3 08:48:27 np0005543227 python3[58840]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1205) Dec 3 08:48:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1200) Dec 3 08:48:37 np0005543227 python3[58871]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1195) Dec 3 08:48:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1190) Dec 3 08:48:44 np0005543227 sshd[58889]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:48:47 np0005543227 python3[58905]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1185) Dec 3 08:48:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1180) Dec 3 08:48:58 np0005543227 python3[58938]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:48:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1175) Dec 3 08:49:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1170) Dec 3 08:49:08 np0005543227 python3[58971]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1165) Dec 3 08:49:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1160) Dec 3 08:49:18 np0005543227 python3[59004]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1155) Dec 3 08:49:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1150) Dec 3 08:49:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1145) Dec 3 08:49:28 np0005543227 python3[59037]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1140) Dec 3 08:49:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1135) Dec 3 08:49:39 np0005543227 python3[59070]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1130) Dec 3 08:49:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1125) Dec 3 08:49:49 np0005543227 python3[59103]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:49:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1120) Dec 3 08:49:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1115) Dec 3 08:49:59 np0005543227 python3[59136]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1110) Dec 3 08:50:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1105) Dec 3 08:50:10 np0005543227 python3[59166]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1100) Dec 3 08:50:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1095) Dec 3 08:50:20 np0005543227 python3[59199]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1090) Dec 3 08:50:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1085) Dec 3 08:50:30 np0005543227 python3[59232]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1080) Dec 3 08:50:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1075) Dec 3 08:50:41 np0005543227 python3[59253]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1070) Dec 3 08:50:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1065) Dec 3 08:50:51 np0005543227 python3[59284]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:50:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1060) Dec 3 08:50:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1055) Dec 3 08:51:01 np0005543227 python3[59317]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1050) Dec 3 08:51:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1045) Dec 3 08:51:11 np0005543227 python3[59350]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1040) Dec 3 08:51:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1035) Dec 3 08:51:22 np0005543227 python3[59383]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1030) Dec 3 08:51:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1025) Dec 3 08:51:32 np0005543227 python3[59416]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1020) Dec 3 08:51:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1015) Dec 3 08:51:42 np0005543227 python3[59449]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1010) Dec 3 08:51:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1005) Dec 3 08:51:53 np0005543227 python3[59482]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:51:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (1000) Dec 3 08:51:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (995) Dec 3 08:52:03 np0005543227 python3[59515]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (990) Dec 3 08:52:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (985) Dec 3 08:52:13 np0005543227 python3[59548]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (980) Dec 3 08:52:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (975) Dec 3 08:52:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (970) Dec 3 08:52:24 np0005543227 python3[59579]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (965) Dec 3 08:52:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (960) Dec 3 08:52:34 np0005543227 python3[59612]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (955) Dec 3 08:52:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (950) Dec 3 08:52:44 np0005543227 python3[59645]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (945) Dec 3 08:52:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (940) Dec 3 08:52:54 np0005543227 python3[59666]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:52:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (935) Dec 3 08:53:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (930) Dec 3 08:53:05 np0005543227 python3[59697]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (925) Dec 3 08:53:13 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (920) Dec 3 08:53:15 np0005543227 python3[59730]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:18 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (915) Dec 3 08:53:23 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (910) Dec 3 08:53:25 np0005543227 python3[59764]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:28 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (905) Dec 3 08:53:33 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (900) Dec 3 08:53:36 np0005543227 python3[59797]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:38 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (895) Dec 3 08:53:43 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (890) Dec 3 08:53:46 np0005543227 python3[59830]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:48 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (885) Dec 3 08:53:53 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (880) Dec 3 08:53:56 np0005543227 python3[59863]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:53:58 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (875) Dec 3 08:54:03 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (870) Dec 3 08:54:07 np0005543227 python3[59896]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:08 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (865) Dec 3 08:54:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (860) Dec 3 08:54:17 np0005543227 python3[59929]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (855) Dec 3 08:54:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (850) Dec 3 08:54:27 np0005543227 python3[59962]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (845) Dec 3 08:54:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (840) Dec 3 08:54:37 np0005543227 python3[59994]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (835) Dec 3 08:54:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (830) Dec 3 08:54:48 np0005543227 python3[60025]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (825) Dec 3 08:54:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (820) Dec 3 08:54:58 np0005543227 python3[60048]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:54:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (815) Dec 3 08:54:59 np0005543227 sshd[60059]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:55:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (810) Dec 3 08:55:08 np0005543227 python3[60082]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (805) Dec 3 08:55:11 np0005543227 sshd[60100]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:55:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (800) Dec 3 08:55:19 np0005543227 python3[60119]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (795) Dec 3 08:55:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (790) Dec 3 08:55:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (785) Dec 3 08:55:29 np0005543227 python3[60153]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (780) Dec 3 08:55:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (775) Dec 3 08:55:39 np0005543227 python3[60186]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (770) Dec 3 08:55:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (765) Dec 3 08:55:49 np0005543227 python3[60219]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:55:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (760) Dec 3 08:55:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (755) Dec 3 08:56:00 np0005543227 python3[60252]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (750) Dec 3 08:56:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (745) Dec 3 08:56:10 np0005543227 python3[60285]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (740) Dec 3 08:56:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (735) Dec 3 08:56:20 np0005543227 python3[60318]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (730) Dec 3 08:56:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (725) Dec 3 08:56:31 np0005543227 python3[60351]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (720) Dec 3 08:56:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (715) Dec 3 08:56:41 np0005543227 python3[60384]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (710) Dec 3 08:56:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (705) Dec 3 08:56:51 np0005543227 python3[60415]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:56:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (700) Dec 3 08:56:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (695) Dec 3 08:57:02 np0005543227 python3[60447]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (690) Dec 3 08:57:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (685) Dec 3 08:57:12 np0005543227 python3[60470]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (680) Dec 3 08:57:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (675) Dec 3 08:57:22 np0005543227 python3[60499]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (670) Dec 3 08:57:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (665) Dec 3 08:57:32 np0005543227 python3[60532]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (660) Dec 3 08:57:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (655) Dec 3 08:57:43 np0005543227 python3[60565]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (650) Dec 3 08:57:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (645) Dec 3 08:57:53 np0005543227 python3[60599]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:57:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (640) Dec 3 08:57:54 np0005543227 sshd[60600]: main: sshd: ssh-rsa algorithm is disabled Dec 3 08:57:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (635) Dec 3 08:58:03 np0005543227 python3[60635]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (630) Dec 3 08:58:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (625) Dec 3 08:58:14 np0005543227 python3[60668]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (620) Dec 3 08:58:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (615) Dec 3 08:58:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (610) Dec 3 08:58:24 np0005543227 python3[60701]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (605) Dec 3 08:58:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (600) Dec 3 08:58:34 np0005543227 python3[60734]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (595) Dec 3 08:58:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (590) Dec 3 08:58:45 np0005543227 python3[60767]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (585) Dec 3 08:58:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (580) Dec 3 08:58:55 np0005543227 python3[60800]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:58:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (575) Dec 3 08:59:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (570) Dec 3 08:59:05 np0005543227 python3[60833]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (565) Dec 3 08:59:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (560) Dec 3 08:59:16 np0005543227 python3[60863]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (555) Dec 3 08:59:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (550) Dec 3 08:59:26 np0005543227 python3[60884]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (545) Dec 3 08:59:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (540) Dec 3 08:59:36 np0005543227 python3[60915]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (535) Dec 3 08:59:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (530) Dec 3 08:59:46 np0005543227 python3[60948]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (525) Dec 3 08:59:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (520) Dec 3 08:59:57 np0005543227 python3[60981]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 08:59:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (515) Dec 3 09:00:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (510) Dec 3 09:00:07 np0005543227 python3[61014]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (505) Dec 3 09:00:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (500) Dec 3 09:00:17 np0005543227 python3[61047]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (495) Dec 3 09:00:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (490) Dec 3 09:00:28 np0005543227 python3[61080]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (485) Dec 3 09:00:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (480) Dec 3 09:00:38 np0005543227 python3[61113]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (475) Dec 3 09:00:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (470) Dec 3 09:00:48 np0005543227 python3[61146]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (465) Dec 3 09:00:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (460) Dec 3 09:00:58 np0005543227 python3[61179]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:00:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (455) Dec 3 09:01:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (450) Dec 3 09:01:09 np0005543227 python3[61223]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (445) Dec 3 09:01:11 np0005543227 sshd[61224]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:01:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (440) Dec 3 09:01:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (435) Dec 3 09:01:19 np0005543227 python3[61257]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (430) Dec 3 09:01:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (425) Dec 3 09:01:29 np0005543227 python3[61277]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (420) Dec 3 09:01:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (415) Dec 3 09:01:40 np0005543227 python3[61307]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (410) Dec 3 09:01:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (405) Dec 3 09:01:50 np0005543227 python3[61340]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:01:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (400) Dec 3 09:01:59 np0005543227 sshd[61358]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:01:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (395) Dec 3 09:02:00 np0005543227 python3[61374]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (390) Dec 3 09:02:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (385) Dec 3 09:02:10 np0005543227 python3[61407]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (380) Dec 3 09:02:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (375) Dec 3 09:02:21 np0005543227 python3[61440]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (370) Dec 3 09:02:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (365) Dec 3 09:02:31 np0005543227 python3[61473]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (360) Dec 3 09:02:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (355) Dec 3 09:02:41 np0005543227 python3[61506]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (350) Dec 3 09:02:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (345) Dec 3 09:02:52 np0005543227 python3[61539]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:02:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (340) Dec 3 09:02:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (335) Dec 3 09:03:02 np0005543227 python3[61572]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (330) Dec 3 09:03:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (325) Dec 3 09:03:12 np0005543227 python3[61605]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (320) Dec 3 09:03:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (315) Dec 3 09:03:23 np0005543227 python3[61639]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (310) Dec 3 09:03:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (305) Dec 3 09:03:33 np0005543227 python3[61672]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (300) Dec 3 09:03:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (295) Dec 3 09:03:43 np0005543227 python3[61701]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (290) Dec 3 09:03:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (285) Dec 3 09:03:54 np0005543227 python3[61723]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:03:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (280) Dec 3 09:03:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (275) Dec 3 09:04:04 np0005543227 python3[61754]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (270) Dec 3 09:04:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (265) Dec 3 09:04:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (260) Dec 3 09:04:14 np0005543227 python3[61787]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (255) Dec 3 09:04:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (250) Dec 3 09:04:25 np0005543227 python3[61820]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (245) Dec 3 09:04:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (240) Dec 3 09:04:35 np0005543227 python3[61853]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (235) Dec 3 09:04:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (230) Dec 3 09:04:45 np0005543227 python3[61886]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (225) Dec 3 09:04:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (220) Dec 3 09:04:56 np0005543227 python3[61919]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:04:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (215) Dec 3 09:05:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (210) Dec 3 09:05:06 np0005543227 python3[61952]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (205) Dec 3 09:05:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (200) Dec 3 09:05:16 np0005543227 python3[61985]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (195) Dec 3 09:05:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (190) Dec 3 09:05:27 np0005543227 python3[62018]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (185) Dec 3 09:05:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (180) Dec 3 09:05:37 np0005543227 python3[62051]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (175) Dec 3 09:05:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (170) Dec 3 09:05:47 np0005543227 python3[62084]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (165) Dec 3 09:05:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (160) Dec 3 09:05:57 np0005543227 python3[62114]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:05:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (155) Dec 3 09:06:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (150) Dec 3 09:06:08 np0005543227 python3[62137]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (145) Dec 3 09:06:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (140) Dec 3 09:06:18 np0005543227 python3[62166]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (135) Dec 3 09:06:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (130) Dec 3 09:06:28 np0005543227 python3[62199]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (125) Dec 3 09:06:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (120) Dec 3 09:06:39 np0005543227 python3[62232]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (115) Dec 3 09:06:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (110) Dec 3 09:06:49 np0005543227 python3[62265]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (105) Dec 3 09:06:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (100) Dec 3 09:06:59 np0005543227 python3[62298]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:06:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (95) Dec 3 09:07:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (90) Dec 3 09:07:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (85) Dec 3 09:07:10 np0005543227 python3[62331]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (80) Dec 3 09:07:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (75) Dec 3 09:07:20 np0005543227 python3[62364]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (70) Dec 3 09:07:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (65) Dec 3 09:07:30 np0005543227 python3[62397]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:34 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (60) Dec 3 09:07:39 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (55) Dec 3 09:07:40 np0005543227 python3[62430]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:44 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (50) Dec 3 09:07:49 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (45) Dec 3 09:07:51 np0005543227 python3[62464]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:07:54 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (40) Dec 3 09:07:59 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (35) Dec 3 09:08:01 np0005543227 python3[62494]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:04 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (30) Dec 3 09:08:09 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (25) Dec 3 09:08:11 np0005543227 python3[62528]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:14 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (20) Dec 3 09:08:19 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (15) Dec 3 09:08:22 np0005543227 python3[62551]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:24 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (10) Dec 3 09:08:29 np0005543227 ansible-async_wrapper.py[48803]: 48804 still running (5) Dec 3 09:08:32 np0005543227 python3[62580]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:34 np0005543227 ansible-async_wrapper.py[48803]: Timeout reached, now killing 48804 Dec 3 09:08:34 np0005543227 ansible-async_wrapper.py[48803]: Sent kill to group 48804 Dec 3 09:08:42 np0005543227 python3[62613]: ansible-ansible.legacy.async_status Invoked with jid=816055272024.48800 mode=status _async_dir=/tmp/.ansible_async Dec 3 09:08:43 np0005543227 python3[62629]: ansible-file Invoked with path=/var/lib/container-puppet/puppetlabs state=directory setype=svirt_sandbox_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 09:08:43 np0005543227 python3[62645]: ansible-stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:08:44 np0005543227 python3[62693]: ansible-ansible.legacy.stat Invoked with path=/var/lib/container-puppet/puppetlabs/facter.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:08:44 np0005543227 python3[62736]: ansible-ansible.legacy.copy Invoked with dest=/var/lib/container-puppet/puppetlabs/facter.conf setype=svirt_sandbox_file_t selevel=s0 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752924.0307105-173457-129584060366696/source _original_basename=tmp3tri9r19 follow=False checksum=53908622cb869db5e2e2a68e737aa2ab1a872111 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None attributes=None Dec 3 09:08:45 np0005543227 python3[62766]: ansible-file Invoked with path=/opt/puppetlabs/facter state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:08:46 np0005543227 python3[62870]: ansible-ansible.posix.synchronize Invoked with src=/opt/puppetlabs/ dest=/var/lib/container-puppet/puppetlabs/ _local_rsync_path=rsync _local_rsync_password=NOT_LOGGING_PARAMETER rsync_path=None delete=False _substitute_controller=False archive=True checksum=False compress=True existing_only=False dirs=False copy_links=False set_remote_user=True rsync_timeout=0 rsync_opts=[] ssh_connection_multiplexing=False partial=False verify_host=False mode=push dest_port=None private_key=None recursive=None links=None perms=None times=None owner=None group=None ssh_args=None link_dest=None Dec 3 09:08:46 np0005543227 python3[62889]: ansible-file Invoked with path=/var/lib/tripleo-config/container-puppet-config mode=448 recurse=True setype=container_file_t force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False state=None _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Dec 3 09:08:47 np0005543227 python3[62905]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=False puppet_config=/var/lib/container-puppet/container-puppet.json short_hostname=np0005543227 step=1 update_config_hash_only=False Dec 3 09:08:47 np0005543227 python3[62921]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:08:48 np0005543227 python3[62937]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Dec 3 09:08:48 np0005543227 systemd-journald[619]: Field hash table of /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal has a fill level at 75.4 (251 of 333 items), suggesting rotation. Dec 3 09:08:48 np0005543227 systemd-journald[619]: /run/log/journal/091dc475157499b18701a707a9102fd4/system.journal: Journal header limits reached or header out-of-date, rotating. Dec 3 09:08:48 np0005543227 rsyslogd[48609]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 09:08:48 np0005543227 rsyslogd[48609]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Dec 3 09:08:48 np0005543227 python3[62954]: ansible-containers.podman.podman_container_info Invoked with executable=podman name=None Dec 3 09:08:49 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:08:49 np0005543227 python3[62983]: ansible-tripleo_container_manage Invoked with config_id=tripleo_puppet_step1 config_dir=/var/lib/tripleo-config/container-puppet-config/step_1 config_patterns=container-puppet-*.json config_overrides={} concurrency=6 log_base_path=/var/log/containers/stdouts debug=False Dec 3 09:08:49 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:08:49 np0005543227 podman[63199]: 2025-12-03 09:08:49.964736355 +0000 UTC m=+0.056939904 container create 45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, com.redhat.component=openstack-collectd-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, io.openshift.expose-services=, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 collectd, build-date=2025-11-18T22:51:28Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-collectd, distribution-scope=public, container_name=container-puppet-collectd, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044) Dec 3 09:08:49 np0005543227 podman[63149]: 2025-12-03 09:08:49.991816439 +0000 UTC m=+0.133432120 container create 133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, architecture=x86_64, vcs-type=git, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, container_name=container-puppet-glance_api_internal, maintainer=OpenStack TripleO Team, release=1761123044, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-glance-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_puppet_step1, distribution-scope=public, build-date=2025-11-18T23:45:01Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, url=https://www.redhat.com) Dec 3 09:08:50 np0005543227 podman[63149]: 2025-12-03 09:08:49.903031515 +0000 UTC m=+0.044647226 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 09:08:50 np0005543227 systemd[1]: Created slice Slice /machine. Dec 3 09:08:50 np0005543227 systemd[1]: Started libpod-conmon-45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41.scope. Dec 3 09:08:50 np0005543227 podman[63211]: 2025-12-03 09:08:50.006652465 +0000 UTC m=+0.072641497 container create 461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, build-date=2025-11-18T22:51:13Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_puppet_step1, name=rhosp17/openstack-mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, distribution-scope=public, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 mariadb, vendor=Red Hat, Inc., tcib_managed=true, io.openshift.expose-services=, version=17.1.12, architecture=x86_64, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-clustercheck) Dec 3 09:08:50 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:50 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/5fd3a76d65de8b854d750985a1b4902af991b3b169a0244d8865fdc7e9beedf4/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:50 np0005543227 systemd[1]: Started libpod-conmon-461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc.scope. Dec 3 09:08:50 np0005543227 systemd[1]: Started libpod-conmon-133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948.scope. Dec 3 09:08:50 np0005543227 podman[63199]: 2025-12-03 09:08:49.934409541 +0000 UTC m=+0.026613090 image pull registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Dec 3 09:08:50 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:50 np0005543227 podman[63198]: 2025-12-03 09:08:50.038135614 +0000 UTC m=+0.135943786 container create bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, vcs-type=git, config_id=tripleo_puppet_step1, com.redhat.component=openstack-glance-api-container, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, name=rhosp17/openstack-glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, maintainer=OpenStack TripleO Team, build-date=2025-11-18T23:45:01Z, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vendor=Red Hat, Inc., io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-glance_api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.openshift.expose-services=, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:08:50 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:50 np0005543227 podman[63198]: 2025-12-03 09:08:49.938727154 +0000 UTC m=+0.036535336 image pull registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 09:08:50 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/b9eed75b023f35b43296906c9b27b0566b29968d5cd08eaabb066da32768fd61/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:50 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ebafd977d89bba05db5856690fc152a762958af12fceeb3b6c892acb25885af7/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:50 np0005543227 podman[63199]: 2025-12-03 09:08:50.043610953 +0000 UTC m=+0.135814512 container init 45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, managed_by=tripleo_ansible, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-collectd, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, url=https://www.redhat.com, vendor=Red Hat, Inc., io.openshift.expose-services=, build-date=2025-11-18T22:51:28Z, maintainer=OpenStack TripleO Team, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, container_name=container-puppet-collectd, summary=Red Hat OpenStack Platform 17.1 collectd, com.redhat.component=openstack-collectd-container, version=17.1.12, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:08:50 np0005543227 podman[63201]: 2025-12-03 09:08:49.945614076 +0000 UTC m=+0.034509723 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Dec 3 09:08:50 np0005543227 podman[63149]: 2025-12-03 09:08:50.05095804 +0000 UTC m=+0.192573711 container init 133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 glance-api, url=https://www.redhat.com, vcs-type=git, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, release=1761123044, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, build-date=2025-11-18T23:45:01Z, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, vendor=Red Hat, Inc., com.redhat.component=openstack-glance-api-container, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, distribution-scope=public, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, name=rhosp17/openstack-glance-api, tcib_managed=true, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.4, container_name=container-puppet-glance_api_internal, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api) Dec 3 09:08:50 np0005543227 podman[63199]: 2025-12-03 09:08:50.053032503 +0000 UTC m=+0.145236062 container start 45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-collectd, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, version=17.1.12, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, com.redhat.component=openstack-collectd-container, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, container_name=container-puppet-collectd, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, release=1761123044, build-date=2025-11-18T22:51:28Z, description=Red Hat OpenStack Platform 17.1 collectd, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd) Dec 3 09:08:50 np0005543227 podman[63199]: 2025-12-03 09:08:50.053199718 +0000 UTC m=+0.145403267 container attach 45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-collectd, container_name=container-puppet-collectd, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, url=https://www.redhat.com, com.redhat.component=openstack-collectd-container, description=Red Hat OpenStack Platform 17.1 collectd, version=17.1.12, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 collectd, distribution-scope=public, vcs-type=git, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:51:28Z) Dec 3 09:08:50 np0005543227 podman[63217]: 2025-12-03 09:08:50.054178309 +0000 UTC m=+0.129229390 container create 4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.openshift.expose-services=, build-date=2025-11-19T00:11:59Z, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, config_id=tripleo_puppet_step1, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 ceilometer-central, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-ceilometer-central-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp17/openstack-ceilometer-central, vendor=Red Hat, Inc., io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, version=17.1.12, release=1761123044, architecture=x86_64, container_name=container-puppet-ceilometer, managed_by=tripleo_ansible, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:08:50 np0005543227 podman[63211]: 2025-12-03 09:08:49.960907187 +0000 UTC m=+0.026896259 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:08:50 np0005543227 podman[63201]: 2025-12-03 09:08:50.069197541 +0000 UTC m=+0.158093188 container create d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, build-date=2025-11-19T00:20:06Z, com.redhat.component=openstack-cinder-api-container, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 cinder-api, io.buildah.version=1.41.4, container_name=container-puppet-cinder, architecture=x86_64, release=1761123044, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vcs-type=git, url=https://www.redhat.com, name=rhosp17/openstack-cinder-api) Dec 3 09:08:50 np0005543227 systemd[1]: Started libpod-conmon-4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf.scope. Dec 3 09:08:50 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:50 np0005543227 podman[63211]: 2025-12-03 09:08:50.097001267 +0000 UTC m=+0.162990299 container init 461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, config_id=tripleo_puppet_step1, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, architecture=x86_64, com.redhat.component=openstack-mariadb-container, container_name=container-puppet-clustercheck, build-date=2025-11-18T22:51:13Z, summary=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, vcs-type=git, batch=17.1_20251118.1) Dec 3 09:08:50 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9e918e85573708e626d4a6ef78ac0f0b358f58a6e7b0290d07a7750ef819fadf/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:50 np0005543227 podman[63211]: 2025-12-03 09:08:50.104123827 +0000 UTC m=+0.170112859 container start 461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, build-date=2025-11-18T22:51:13Z, container_name=container-puppet-clustercheck, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, name=rhosp17/openstack-mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., managed_by=tripleo_ansible, architecture=x86_64, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, version=17.1.12, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container) Dec 3 09:08:50 np0005543227 podman[63211]: 2025-12-03 09:08:50.10457875 +0000 UTC m=+0.170567782 container attach 461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-mariadb-container, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., tcib_managed=true, vcs-type=git, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, container_name=container-puppet-clustercheck, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, build-date=2025-11-18T22:51:13Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-mariadb, version=17.1.12, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=) Dec 3 09:08:50 np0005543227 podman[63149]: 2025-12-03 09:08:50.10847519 +0000 UTC m=+0.250090861 container start 133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, vcs-type=git, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.component=openstack-glance-api-container, summary=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, io.openshift.expose-services=, container_name=container-puppet-glance_api_internal, release=1761123044, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.buildah.version=1.41.4, distribution-scope=public, build-date=2025-11-18T23:45:01Z, architecture=x86_64, url=https://www.redhat.com, name=rhosp17/openstack-glance-api, managed_by=tripleo_ansible) Dec 3 09:08:50 np0005543227 podman[63149]: 2025-12-03 09:08:50.108774039 +0000 UTC m=+0.250389710 container attach 133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, summary=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, name=rhosp17/openstack-glance-api, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-glance-api-container, config_id=tripleo_puppet_step1, release=1761123044, batch=17.1_20251118.1, container_name=container-puppet-glance_api_internal, build-date=2025-11-18T23:45:01Z, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vendor=Red Hat, Inc., vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.expose-services=) Dec 3 09:08:50 np0005543227 podman[63217]: 2025-12-03 09:08:50.016345023 +0000 UTC m=+0.091396114 image pull registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Dec 3 09:08:50 np0005543227 systemd[1]: Started libpod-conmon-bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639.scope. Dec 3 09:08:50 np0005543227 systemd[1]: Started libpod-conmon-d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627.scope. Dec 3 09:08:50 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:50 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:50 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/34d21a426c63b3a9d5e4824a1ba2718baf5a104be179e3ed8df7fac0bb7110b4/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:50 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/9f3e3cdc9fd90125a32d6afef410eecfafe8a5f65329f25cf9b155565bc40c3f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:50 np0005543227 podman[63198]: 2025-12-03 09:08:50.139767133 +0000 UTC m=+0.237575305 container init bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, container_name=container-puppet-glance_api, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, io.buildah.version=1.41.4, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, version=17.1.12, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, com.redhat.component=openstack-glance-api-container, url=https://www.redhat.com, name=rhosp17/openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 glance-api, summary=Red Hat OpenStack Platform 17.1 glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vendor=Red Hat, Inc., batch=17.1_20251118.1, architecture=x86_64, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, build-date=2025-11-18T23:45:01Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, maintainer=OpenStack TripleO Team) Dec 3 09:08:50 np0005543227 podman[63198]: 2025-12-03 09:08:50.146238623 +0000 UTC m=+0.244046795 container start bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.12, vendor=Red Hat, Inc., io.openshift.expose-services=, tcib_managed=true, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 glance-api, release=1761123044, com.redhat.component=openstack-glance-api-container, maintainer=OpenStack TripleO Team, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-glance_api, architecture=x86_64, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, build-date=2025-11-18T23:45:01Z, config_id=tripleo_puppet_step1, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, name=rhosp17/openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:08:50 np0005543227 podman[63198]: 2025-12-03 09:08:50.146345766 +0000 UTC m=+0.244153938 container attach bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-glance-api-container, tcib_managed=true, release=1761123044, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, build-date=2025-11-18T23:45:01Z, io.openshift.expose-services=, name=rhosp17/openstack-glance-api, batch=17.1_20251118.1, container_name=container-puppet-glance_api, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api) Dec 3 09:08:50 np0005543227 podman[63217]: 2025-12-03 09:08:50.162858265 +0000 UTC m=+0.237909346 container init 4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.buildah.version=1.41.4, vendor=Red Hat, Inc., managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, distribution-scope=public, maintainer=OpenStack TripleO Team, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, version=17.1.12, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, release=1761123044, description=Red Hat OpenStack Platform 17.1 ceilometer-central, build-date=2025-11-19T00:11:59Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, name=rhosp17/openstack-ceilometer-central, batch=17.1_20251118.1, com.redhat.component=openstack-ceilometer-central-container, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, tcib_managed=true, container_name=container-puppet-ceilometer, io.openshift.expose-services=, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Dec 3 09:08:50 np0005543227 podman[63217]: 2025-12-03 09:08:50.170326734 +0000 UTC m=+0.245377825 container start 4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.buildah.version=1.41.4, build-date=2025-11-19T00:11:59Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.openshift.expose-services=, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_puppet_step1, distribution-scope=public, batch=17.1_20251118.1, container_name=container-puppet-ceilometer, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 ceilometer-central, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, release=1761123044, managed_by=tripleo_ansible, com.redhat.component=openstack-ceilometer-central-container, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, url=https://www.redhat.com, tcib_managed=true, name=rhosp17/openstack-ceilometer-central, architecture=x86_64) Dec 3 09:08:50 np0005543227 podman[63217]: 2025-12-03 09:08:50.17053661 +0000 UTC m=+0.245587711 container attach 4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, io.openshift.expose-services=, container_name=container-puppet-ceilometer, url=https://www.redhat.com, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, com.redhat.component=openstack-ceilometer-central-container, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, name=rhosp17/openstack-ceilometer-central, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, architecture=x86_64, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, build-date=2025-11-19T00:11:59Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, managed_by=tripleo_ansible, release=1761123044, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 ceilometer-central, version=17.1.12, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Dec 3 09:08:50 np0005543227 podman[63201]: 2025-12-03 09:08:50.190043961 +0000 UTC m=+0.278939638 container init d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, container_name=container-puppet-cinder, vendor=Red Hat, Inc., tcib_managed=true, distribution-scope=public, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, release=1761123044, batch=17.1_20251118.1, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-cinder-api-container, vcs-type=git, build-date=2025-11-19T00:20:06Z, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, description=Red Hat OpenStack Platform 17.1 cinder-api, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp17/openstack-cinder-api, url=https://www.redhat.com, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:08:50 np0005543227 podman[63201]: 2025-12-03 09:08:50.197574363 +0000 UTC m=+0.286470010 container start d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, vendor=Red Hat, Inc., org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, distribution-scope=public, url=https://www.redhat.com, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, vcs-type=git, description=Red Hat OpenStack Platform 17.1 cinder-api, build-date=2025-11-19T00:20:06Z, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-cinder-api-container, container_name=container-puppet-cinder, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, name=rhosp17/openstack-cinder-api, version=17.1.12, architecture=x86_64, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 cinder-api) Dec 3 09:08:50 np0005543227 podman[63201]: 2025-12-03 09:08:50.198906095 +0000 UTC m=+0.287801822 container attach d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, architecture=x86_64, managed_by=tripleo_ansible, com.redhat.component=openstack-cinder-api-container, build-date=2025-11-19T00:20:06Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, container_name=container-puppet-cinder, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vcs-type=git, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., name=rhosp17/openstack-cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 cinder-api, release=1761123044, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 cinder-api, url=https://www.redhat.com, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, batch=17.1_20251118.1) Dec 3 09:08:51 np0005543227 systemd[1]: tmp-crun.5sD66b.mount: Deactivated successfully. Dec 3 09:08:51 np0005543227 puppet-user[63308]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:51 np0005543227 puppet-user[63308]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:51 np0005543227 puppet-user[63308]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:51 np0005543227 puppet-user[63308]: (file & line not available) Dec 3 09:08:51 np0005543227 puppet-user[63308]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:51 np0005543227 puppet-user[63308]: (file & line not available) Dec 3 09:08:51 np0005543227 puppet-user[63306]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:51 np0005543227 puppet-user[63306]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:51 np0005543227 puppet-user[63306]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:51 np0005543227 puppet-user[63306]: (file & line not available) Dec 3 09:08:51 np0005543227 puppet-user[63373]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:51 np0005543227 puppet-user[63373]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:51 np0005543227 puppet-user[63373]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:51 np0005543227 puppet-user[63373]: (file & line not available) Dec 3 09:08:51 np0005543227 puppet-user[63359]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:51 np0005543227 puppet-user[63359]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:51 np0005543227 puppet-user[63359]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:51 np0005543227 puppet-user[63359]: (file & line not available) Dec 3 09:08:51 np0005543227 puppet-user[63373]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:51 np0005543227 puppet-user[63373]: (file & line not available) Dec 3 09:08:51 np0005543227 puppet-user[63373]: Warning: Scope(Class[Tripleo::Profile::Base::Cinder::Api]): The keymgr_backend parameter has been deprecated and has no effect. Dec 3 09:08:51 np0005543227 puppet-user[63306]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:51 np0005543227 puppet-user[63306]: (file & line not available) Dec 3 09:08:51 np0005543227 puppet-user[63346]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:51 np0005543227 puppet-user[63346]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:51 np0005543227 puppet-user[63346]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:51 np0005543227 puppet-user[63346]: (file & line not available) Dec 3 09:08:51 np0005543227 puppet-user[63359]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:51 np0005543227 puppet-user[63359]: (file & line not available) Dec 3 09:08:52 np0005543227 puppet-user[63346]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:52 np0005543227 puppet-user[63346]: (file & line not available) Dec 3 09:08:52 np0005543227 puppet-user[63373]: Warning: Scope(Class[Cinder]): The database_connection parameter is deprecated and will be \ Dec 3 09:08:52 np0005543227 puppet-user[63373]: removed in a future realse. Use cinder::db::database_connection instead Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::cache_backend'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 145, column: 39) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::memcache_servers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 146, column: 39) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::cache_tls_enabled'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 147, column: 39) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::cache_tls_cafile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 148, column: 39) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::cache_tls_certfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 149, column: 39) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::cache_tls_keyfile'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 150, column: 39) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::cache_tls_allowed_ciphers'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 151, column: 39) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::manage_backend_package'. (file: /etc/puppet/modules/ceilometer/manifests/cache.pp, line: 152, column: 39) Dec 3 09:08:52 np0005543227 puppet-user[63373]: Warning: Unknown variable: 'cinder::api::keymgr_backend'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 455, column: 31) Dec 3 09:08:52 np0005543227 puppet-user[63373]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_api_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 456, column: 42) Dec 3 09:08:52 np0005543227 puppet-user[63373]: Warning: Unknown variable: 'cinder::api::keymgr_encryption_auth_url'. (file: /etc/puppet/modules/cinder/manifests/init.pp, line: 458, column: 43) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_password'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 63, column: 25) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_url'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 68, column: 25) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_region'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 69, column: 28) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 70, column: 25) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_tenant_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 71, column: 29) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_cacert'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 72, column: 23) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_endpoint_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 73, column: 26) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_user_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 74, column: 33) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_project_domain_name'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 75, column: 36) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Warning: Unknown variable: '::ceilometer::agent::auth::auth_type'. (file: /etc/puppet/modules/ceilometer/manifests/agent/service_credentials.pp, line: 76, column: 26) Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.36 seconds Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/content: content changed '{sha256}aea388a73ebafc7e07a81ddb930a91099211f660eee55fbf92c13007a77501e5' to '{sha256}2523d01ee9c3022c0e9f61d896b1474a168e18472aee141cc278e69fe13f41c1' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/owner: owner changed 'collectd' to 'root' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/group: group changed 'collectd' to 'root' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[collectd.conf]/mode: mode changed '0644' to '0640' Dec 3 09:08:52 np0005543227 puppet-user[63329]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:52 np0005543227 puppet-user[63329]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:52 np0005543227 puppet-user[63329]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:52 np0005543227 puppet-user[63329]: (file & line not available) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.46 seconds Dec 3 09:08:52 np0005543227 puppet-user[63329]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:52 np0005543227 puppet-user[63329]: (file & line not available) Dec 3 09:08:52 np0005543227 puppet-user[63329]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.08 seconds Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/owner: owner changed 'collectd' to 'root' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/group: group changed 'collectd' to 'root' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[collectd.d]/mode: mode changed '0755' to '0750' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-cpu.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-interface.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-load.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-memory.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/90-default-plugins-syslog.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/apache.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/dns.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ipmi.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mcelog.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/mysql.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-events.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ovs-stats.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/ping.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/pmu.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/rdt.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/sensors.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/snmp.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/virt.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Config/File[/etc/collectd.d/write_prometheus.conf]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Python/File[/usr/lib/python3.9/site-packages]/mode: mode changed '0755' to '0750' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Python/Collectd::Plugin[python]/File[python.load]/ensure: defined content as '{sha256}0163924a0099dd43fe39cb85e836df147fd2cfee8197dc6866d3c384539eb6ee' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Python/Concat[/etc/collectd.d/python-config.conf]/File[/etc/collectd.d/python-config.conf]/ensure: defined content as '{sha256}2e5fb20e60b30f84687fc456a37fc62451000d2d85f5bbc1b3fca3a5eac9deeb' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Logfile/Collectd::Plugin[logfile]/File[logfile.load]/ensure: defined content as '{sha256}07bbda08ef9b824089500bdc6ac5a86e7d1ef2ae3ed4ed423c0559fe6361e5af' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Amqp1/Collectd::Plugin[amqp1]/File[amqp1.load]/ensure: defined content as '{sha256}0a0a0c34274f275b8970cc3156d0c892aac464f2f22050f0f98a3290e82a97cd' Dec 3 09:08:52 np0005543227 puppet-user[63329]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}1055bb4b20edcf32d23c749a06e0ca57a0f021d4d5d9e8768bf93da138f28060' Dec 3 09:08:52 np0005543227 puppet-user[63329]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.d]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Cpu/Collectd::Plugin[cpu]/File[cpu.load]/ensure: defined content as '{sha256}67d4c8bf6bf5785f4cb6b596712204d9eacbcebbf16fe289907195d4d3cb0e34' Dec 3 09:08:52 np0005543227 puppet-user[63329]: Notice: /Stage[main]/Xinetd/File[/etc/xinetd.conf]/ensure: defined content as '{sha256}37f48d3e5dce056a46519d144042a388bde95ea9fa161d3362eedf70e7987a91' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/http_timeout]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Df/Collectd::Plugin[df]/File[df.load]/ensure: defined content as '{sha256}edeb4716d96fc9dca2c6adfe07bae70ba08c6af3944a3900581cba0f08f3c4ba' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[DEFAULT/host]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63329]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Clustercheck/Xinetd::Service[galera-monitor]/File[/etc/xinetd.d/galera-monitor]/ensure: defined content as '{sha256}fd21593539aa04bcfd2d4305d9076d8e0e3ab6984a3f98adca51feb2428cb9ba' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[publisher/telemetry_secret]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Disk/Collectd::Plugin[disk]/File[disk.load]/ensure: defined content as '{sha256}1d0cb838278f3226fcd381f0fc2e0e1abaf0d590f4ba7bcb2fc6ec113d3ebde7' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_name]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63329]: Notice: Applied catalog in 0.03 seconds Dec 3 09:08:52 np0005543227 puppet-user[63329]: Application: Dec 3 09:08:52 np0005543227 puppet-user[63329]: Initial environment: production Dec 3 09:08:52 np0005543227 puppet-user[63329]: Converged environment: production Dec 3 09:08:52 np0005543227 puppet-user[63329]: Run mode: user Dec 3 09:08:52 np0005543227 puppet-user[63329]: Changes: Dec 3 09:08:52 np0005543227 puppet-user[63329]: Total: 4 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Events: Dec 3 09:08:52 np0005543227 puppet-user[63329]: Success: 4 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Total: 4 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Resources: Dec 3 09:08:52 np0005543227 puppet-user[63329]: Changed: 4 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Out of sync: 4 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Skipped: 9 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Total: 13 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Time: Dec 3 09:08:52 np0005543227 puppet-user[63329]: File: 0.02 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Transaction evaluation: 0.02 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Catalog application: 0.03 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Config retrieval: 0.12 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Last run: 1764752932 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Total: 0.03 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Version: Dec 3 09:08:52 np0005543227 puppet-user[63329]: Config: 1764752932 Dec 3 09:08:52 np0005543227 puppet-user[63329]: Puppet: 7.10.0 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[hugepages.load]/ensure: defined content as '{sha256}9b9f35b65a73da8d4037e4355a23b678f2cf61997ccf7a5e1adf2a7ce6415827' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Hugepages/Collectd::Plugin[hugepages]/File[older_hugepages.load]/ensure: removed Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Ceilometer_config[hardware/readonly_user_password]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_url]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/region_name]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Interface/Collectd::Plugin[interface]/File[interface.load]/ensure: defined content as '{sha256}b76b315dc312e398940fe029c6dbc5c18d2b974ff7527469fc7d3617b5222046' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/username]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Load/Collectd::Plugin[load]/File[load.load]/ensure: defined content as '{sha256}af2403f76aebd2f10202d66d2d55e1a8d987eed09ced5a3e3873a4093585dc31' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/password]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_name]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Memory/Collectd::Plugin[memory]/File[memory.load]/ensure: defined content as '{sha256}0f270425ee6b05fc9440ee32b9afd1010dcbddd9b04ca78ff693858f7ecb9d0e' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/interface]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/user_domain_name]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Unixsock/Collectd::Plugin[unixsock]/File[unixsock.load]/ensure: defined content as '{sha256}9d1ec1c51ba386baa6f62d2e019dbd6998ad924bf868b3edc2d24d3dc3c63885' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/project_domain_name]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Service_credentials/Ceilometer_config[service_credentials/auth_type]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Uptime/Collectd::Plugin[uptime]/File[uptime.load]/ensure: defined content as '{sha256}f7a26c6369f904d0ca1af59627ebea15f5e72160bcacdf08d217af282b42e5c0' Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: /Stage[main]/Collectd::Plugin::Memcached/Collectd::Plugin[memcached]/File[memcached.load]/ensure: defined content as '{sha256}09023fb6c5f8101b9893fc6a7e29879ac42bdf20bd779bee49b4e243220b6277' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[DEFAULT/polling_namespaces]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63308]: Notice: Applied catalog in 0.24 seconds Dec 3 09:08:52 np0005543227 puppet-user[63308]: Application: Dec 3 09:08:52 np0005543227 puppet-user[63308]: Initial environment: production Dec 3 09:08:52 np0005543227 puppet-user[63308]: Converged environment: production Dec 3 09:08:52 np0005543227 puppet-user[63308]: Run mode: user Dec 3 09:08:52 np0005543227 puppet-user[63308]: Changes: Dec 3 09:08:52 np0005543227 puppet-user[63308]: Total: 42 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Events: Dec 3 09:08:52 np0005543227 puppet-user[63308]: Success: 42 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Total: 42 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Resources: Dec 3 09:08:52 np0005543227 puppet-user[63308]: Skipped: 12 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Changed: 37 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Out of sync: 37 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Total: 77 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Time: Dec 3 09:08:52 np0005543227 puppet-user[63308]: Concat file: 0.00 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Concat fragment: 0.00 Dec 3 09:08:52 np0005543227 puppet-user[63308]: File: 0.08 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Transaction evaluation: 0.24 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Catalog application: 0.24 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Config retrieval: 0.43 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Last run: 1764752932 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Total: 0.24 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Version: Dec 3 09:08:52 np0005543227 puppet-user[63308]: Config: 1764752931 Dec 3 09:08:52 np0005543227 puppet-user[63308]: Puppet: 7.10.0 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[polling/tenant_name_discovery]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Polling/Ceilometer_config[coordination/backend_url]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Agent::Notification/File[event_pipeline]/ensure: defined content as '{sha256}97b000582d6be7fd4e80bc1fc15bc0358888fdea71d4447491d8c683cd09e21b' Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/backend]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/enabled]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/memcache_servers]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Cache/Oslo::Cache[ceilometer_config]/Ceilometer_config[cache/tls_enabled]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63306]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Dec 3 09:08:52 np0005543227 puppet-user[63306]: glance::backend::multistore::cinder::cinder_os_region_name instead. Dec 3 09:08:52 np0005543227 puppet-user[63306]: Warning: Scope(Class[Glance::Api]): The show_multiple_locations parameter is deprecated, and will be removed in a future release Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Rabbit[ceilometer_config]/Ceilometer_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63346]: Warning: Scope(Class[Glance::Api]): glance::api::os_region_name is deprecated. Use \ Dec 3 09:08:52 np0005543227 puppet-user[63346]: glance::backend::multistore::cinder::cinder_os_region_name instead. Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/rpc_address_prefix]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Amqp[ceilometer_config]/Ceilometer_config[oslo_messaging_amqp/notify_address_prefix]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63373]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/backup.pp, line: 94, column: 18) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63373]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/cinder/manifests/volume.pp, line: 69, column: 18) Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Notifications[ceilometer_config]/Ceilometer_config[oslo_messaging_notifications/topics]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer/Oslo::Messaging::Default[ceilometer_config]/Ceilometer_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/debug]/ensure: created Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: /Stage[main]/Ceilometer::Logging/Oslo::Log[ceilometer_config]/Ceilometer_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:52 np0005543227 systemd[1]: libpod-461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc.scope: Deactivated successfully. Dec 3 09:08:52 np0005543227 systemd[1]: libpod-461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc.scope: Consumed 2.611s CPU time. Dec 3 09:08:52 np0005543227 puppet-user[63359]: Notice: Applied catalog in 0.39 seconds Dec 3 09:08:52 np0005543227 puppet-user[63359]: Application: Dec 3 09:08:52 np0005543227 puppet-user[63359]: Initial environment: production Dec 3 09:08:52 np0005543227 puppet-user[63359]: Converged environment: production Dec 3 09:08:52 np0005543227 puppet-user[63359]: Run mode: user Dec 3 09:08:52 np0005543227 puppet-user[63359]: Changes: Dec 3 09:08:52 np0005543227 puppet-user[63359]: Total: 31 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Events: Dec 3 09:08:52 np0005543227 puppet-user[63359]: Success: 31 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Total: 31 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Resources: Dec 3 09:08:52 np0005543227 puppet-user[63359]: Skipped: 24 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Changed: 31 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Out of sync: 31 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Total: 157 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Time: Dec 3 09:08:52 np0005543227 puppet-user[63359]: File: 0.00 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Ceilometer config: 0.33 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Transaction evaluation: 0.38 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Catalog application: 0.39 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Config retrieval: 0.53 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Last run: 1764752932 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Resources: 0.00 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Total: 0.39 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Version: Dec 3 09:08:52 np0005543227 puppet-user[63359]: Config: 1764752931 Dec 3 09:08:52 np0005543227 puppet-user[63359]: Puppet: 7.10.0 Dec 3 09:08:52 np0005543227 podman[63843]: 2025-12-03 09:08:52.916801664 +0000 UTC m=+0.053758396 container died 461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, name=rhosp17/openstack-mariadb, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:51:13Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, managed_by=tripleo_ansible, com.redhat.component=openstack-mariadb-container, architecture=x86_64, version=17.1.12, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, container_name=container-puppet-clustercheck, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1) Dec 3 09:08:52 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:52 np0005543227 systemd[1]: var-lib-containers-storage-overlay-b9eed75b023f35b43296906c9b27b0566b29968d5cd08eaabb066da32768fd61-merged.mount: Deactivated successfully. Dec 3 09:08:52 np0005543227 systemd[1]: libpod-45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41.scope: Deactivated successfully. Dec 3 09:08:52 np0005543227 systemd[1]: libpod-45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41.scope: Consumed 2.679s CPU time. Dec 3 09:08:52 np0005543227 podman[63199]: 2025-12-03 09:08:52.957660191 +0000 UTC m=+3.049863780 container died 45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-collectd, architecture=x86_64, build-date=2025-11-18T22:51:28Z, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, name=rhosp17/openstack-collectd, release=1761123044, batch=17.1_20251118.1, vendor=Red Hat, Inc., io.openshift.expose-services=, com.redhat.component=openstack-collectd-container, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, managed_by=tripleo_ansible, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 collectd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 collectd) Dec 3 09:08:52 np0005543227 podman[63843]: 2025-12-03 09:08:52.9738741 +0000 UTC m=+0.110830792 container cleanup 461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-clustercheck, release=1761123044, config_id=tripleo_puppet_step1, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, maintainer=OpenStack TripleO Team, architecture=x86_64, io.openshift.expose-services=, vendor=Red Hat, Inc., distribution-scope=public, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible, container_name=container-puppet-clustercheck, summary=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:51:13Z, com.redhat.component=openstack-mariadb-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1) Dec 3 09:08:52 np0005543227 systemd[1]: libpod-conmon-461e1055c2e1bc07be19db3afb3ea01040261aef37e74b8867c66a7f5f5bdbbc.scope: Deactivated successfully. Dec 3 09:08:52 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-clustercheck --conmon-pidfile /run/container-puppet-clustercheck.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=clustercheck --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::pacemaker::clustercheck --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-clustercheck --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'clustercheck', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::pacemaker::clustercheck'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-clustercheck.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:08:53 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:53 np0005543227 podman[63870]: 2025-12-03 09:08:53.078780651 +0000 UTC m=+0.111989509 container cleanup 45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41 (image=registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1, name=container-puppet-collectd, url=https://www.redhat.com, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, com.redhat.component=openstack-collectd-container, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 collectd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, container_name=container-puppet-collectd, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-collectd, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 collectd, description=Red Hat OpenStack Platform 17.1 collectd, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:51:28Z, name=rhosp17/openstack-collectd, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 collectd) Dec 3 09:08:53 np0005543227 systemd[1]: libpod-conmon-45bbfeb7d71ef1287c9bc70f4cedaf980b1a21d4f14cdd07961e4d168c152d41.scope: Deactivated successfully. Dec 3 09:08:53 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-collectd --conmon-pidfile /run/container-puppet-collectd.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,collectd_client_config,exec --env NAME=collectd --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::collectd --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-collectd --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,collectd_client_config,exec', 'NAME': 'collectd', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::collectd'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-collectd.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-collectd:17.1 Dec 3 09:08:53 np0005543227 puppet-user[63306]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Dec 3 09:08:53 np0005543227 puppet-user[63306]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Dec 3 09:08:53 np0005543227 puppet-user[63306]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:53 np0005543227 puppet-user[63306]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:53 np0005543227 puppet-user[63306]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:53 np0005543227 puppet-user[63306]: file names. Dec 3 09:08:53 np0005543227 puppet-user[63306]: Dec 3 09:08:53 np0005543227 puppet-user[63306]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:53 np0005543227 puppet-user[63306]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:53 np0005543227 puppet-user[63306]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:53 np0005543227 puppet-user[63346]: Warning: Scope(Glance::Backend::Multistore::Swift[default_backend]): The swift_store_config_file parameter is deprecated Dec 3 09:08:53 np0005543227 puppet-user[63346]: Warning: Scope(Apache::Vhost[glance-api-proxy]): Dec 3 09:08:53 np0005543227 puppet-user[63346]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:53 np0005543227 puppet-user[63346]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:53 np0005543227 puppet-user[63346]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:53 np0005543227 puppet-user[63346]: file names. Dec 3 09:08:53 np0005543227 puppet-user[63346]: Dec 3 09:08:53 np0005543227 puppet-user[63346]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:53 np0005543227 puppet-user[63346]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:53 np0005543227 puppet-user[63346]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:53 np0005543227 puppet-user[63373]: Warning: Scope(Apache::Vhost[cinder_wsgi]): Dec 3 09:08:53 np0005543227 puppet-user[63373]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:53 np0005543227 puppet-user[63373]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:53 np0005543227 puppet-user[63373]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:53 np0005543227 puppet-user[63373]: file names. Dec 3 09:08:53 np0005543227 puppet-user[63373]: Dec 3 09:08:53 np0005543227 puppet-user[63373]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:53 np0005543227 puppet-user[63373]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:53 np0005543227 puppet-user[63373]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:53 np0005543227 systemd[1]: libpod-4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf.scope: Deactivated successfully. Dec 3 09:08:53 np0005543227 systemd[1]: libpod-4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf.scope: Consumed 2.964s CPU time. Dec 3 09:08:53 np0005543227 podman[63217]: 2025-12-03 09:08:53.301175208 +0000 UTC m=+3.376226349 container died 4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central, vendor=Red Hat, Inc., container_name=container-puppet-ceilometer, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, com.redhat.component=openstack-ceilometer-central-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, distribution-scope=public, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 ceilometer-central, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, release=1761123044, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, io.openshift.expose-services=, managed_by=tripleo_ansible, architecture=x86_64, build-date=2025-11-19T00:11:59Z, url=https://www.redhat.com, name=rhosp17/openstack-ceilometer-central, org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, vcs-type=git) Dec 3 09:08:53 np0005543227 podman[64000]: 2025-12-03 09:08:53.379497849 +0000 UTC m=+0.100781474 container create a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 haproxy, managed_by=tripleo_ansible, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-haproxy-container, url=https://www.redhat.com, build-date=2025-11-18T22:50:48Z, summary=Red Hat OpenStack Platform 17.1 haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-haproxy, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, config_id=tripleo_puppet_step1, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., name=rhosp17/openstack-haproxy, io.openshift.expose-services=, batch=17.1_20251118.1) Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.46 seconds Dec 3 09:08:53 np0005543227 podman[64024]: 2025-12-03 09:08:53.386011219 +0000 UTC m=+0.078283291 container cleanup 4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf (image=registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1, name=container-puppet-ceilometer, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ceilometer-central, summary=Red Hat OpenStack Platform 17.1 ceilometer-central, architecture=x86_64, url=https://www.redhat.com, container_name=container-puppet-ceilometer, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, version=17.1.12, distribution-scope=public, vcs-type=git, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-ceilometer-central, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ceilometer-central, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, batch=17.1_20251118.1, com.redhat.component=openstack-ceilometer-central-container, build-date=2025-11-19T00:11:59Z, release=1761123044, vcs-ref=073ea4b06e5aa460399b0c251f416da40b228676, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=073ea4b06e5aa460399b0c251f416da40b228676, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 ceilometer-central, io.k8s.description=Red Hat OpenStack Platform 17.1 ceilometer-central) Dec 3 09:08:53 np0005543227 systemd[1]: libpod-conmon-4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf.scope: Deactivated successfully. Dec 3 09:08:53 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ceilometer --conmon-pidfile /run/container-puppet-ceilometer.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config --env NAME=ceilometer --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::ceilometer::agent::polling#012#012include tripleo::profile::base::ceilometer::agent::notification#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ceilometer --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,ceilometer_config,ceilometer_config', 'NAME': 'ceilometer', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::ceilometer::agent::polling\n\ninclude tripleo::profile::base::ceilometer::agent::notification\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ceilometer.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central:17.1 Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.44 seconds Dec 3 09:08:53 np0005543227 puppet-user[63373]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.47 seconds Dec 3 09:08:53 np0005543227 podman[64050]: 2025-12-03 09:08:53.423986359 +0000 UTC m=+0.057954446 container create 9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, container_name=container-puppet-heat_api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-19T00:11:00Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, name=rhosp17/openstack-heat-api, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, config_id=tripleo_puppet_step1, url=https://www.redhat.com, io.buildah.version=1.41.4, vendor=Red Hat, Inc., io.openshift.expose-services=, architecture=x86_64, managed_by=tripleo_ansible, batch=17.1_20251118.1, vcs-type=git, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 heat-api, release=1761123044) Dec 3 09:08:53 np0005543227 podman[64000]: 2025-12-03 09:08:53.329641074 +0000 UTC m=+0.050924709 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Dec 3 09:08:53 np0005543227 systemd[1]: Started libpod-conmon-9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e.scope. Dec 3 09:08:53 np0005543227 systemd[1]: Started libpod-conmon-a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d.scope. Dec 3 09:08:53 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:53 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:53 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d5ac5beb5a877242d99fb7c7937f61abb9e0187aef0fc9139b483fa34eccd56f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:53 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f1a75cf11076389b45e12f0833fff8886f0ca79df37eb476f0557b0772d243e5/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:53 np0005543227 podman[64050]: 2025-12-03 09:08:53.465775235 +0000 UTC m=+0.099743332 container init 9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, tcib_managed=true, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., build-date=2025-11-19T00:11:00Z, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-heat-api-container, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, name=rhosp17/openstack-heat-api, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-heat_api, io.buildah.version=1.41.4, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, version=17.1.12, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 heat-api, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api) Dec 3 09:08:53 np0005543227 podman[64000]: 2025-12-03 09:08:53.470740148 +0000 UTC m=+0.192023773 container init a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, build-date=2025-11-18T22:50:48Z, architecture=x86_64, name=rhosp17/openstack-haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, managed_by=tripleo_ansible, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 haproxy, io.buildah.version=1.41.4, release=1761123044, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, container_name=container-puppet-haproxy, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, io.openshift.expose-services=, com.redhat.component=openstack-haproxy-container, vcs-type=git, config_id=tripleo_puppet_step1, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 haproxy, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy) Dec 3 09:08:53 np0005543227 podman[64000]: 2025-12-03 09:08:53.480661644 +0000 UTC m=+0.201945319 container start a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, architecture=x86_64, container_name=container-puppet-haproxy, distribution-scope=public, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 haproxy, release=1761123044, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, version=17.1.12, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:50:48Z, managed_by=tripleo_ansible, name=rhosp17/openstack-haproxy, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:08:53 np0005543227 podman[64000]: 2025-12-03 09:08:53.481551901 +0000 UTC m=+0.202835516 container attach a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:50:48Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, description=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, version=17.1.12, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, config_id=tripleo_puppet_step1, url=https://www.redhat.com, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, container_name=container-puppet-haproxy, name=rhosp17/openstack-haproxy, io.openshift.expose-services=, com.redhat.component=openstack-haproxy-container, vcs-type=git, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, release=1761123044, vendor=Red Hat, Inc., org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:08:53 np0005543227 podman[64050]: 2025-12-03 09:08:53.399065101 +0000 UTC m=+0.033033198 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 09:08:53 np0005543227 podman[64050]: 2025-12-03 09:08:53.521750759 +0000 UTC m=+0.155718856 container start 9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, com.redhat.component=openstack-heat-api-container, version=17.1.12, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., io.openshift.expose-services=, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, container_name=container-puppet-heat_api, io.buildah.version=1.41.4, vcs-type=git, distribution-scope=public, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-heat-api, build-date=2025-11-19T00:11:00Z, architecture=x86_64, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd) Dec 3 09:08:53 np0005543227 podman[64050]: 2025-12-03 09:08:53.524812293 +0000 UTC m=+0.158780380 container attach 9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, name=rhosp17/openstack-heat-api, architecture=x86_64, io.buildah.version=1.41.4, distribution-scope=public, io.openshift.expose-services=, build-date=2025-11-19T00:11:00Z, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-type=git, release=1761123044, tcib_managed=true, container_name=container-puppet-heat_api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, config_id=tripleo_puppet_step1, url=https://www.redhat.com, vendor=Red Hat, Inc., version=17.1.12, com.redhat.component=openstack-heat-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api) Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}81afac3432a9660887efb2b5b85077708be3fbd608765e79b14f9aa0f2eb034e' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}dd339edf7197b62aa1314bd8c6a5ce6a8e6042810fea3df899aac35b98b24fc9' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:08:53 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:08:53 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:08:53 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:08:53 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:08:53 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Cron::Db_purge/Cron[glance-manage db purge]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:08:53 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:08:53 np0005543227 podman[64159]: 2025-12-03 09:08:53.885710835 +0000 UTC m=+0.084387780 container create 07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-heat-api-cfn-container, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, release=1761123044, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, build-date=2025-11-19T00:10:53Z, distribution-scope=public, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., container_name=container-puppet-heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.expose-services=, managed_by=tripleo_ansible, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, name=rhosp17/openstack-heat-api-cfn) Dec 3 09:08:53 np0005543227 systemd[1]: Started libpod-conmon-07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e.scope. Dec 3 09:08:53 np0005543227 systemd[1]: var-lib-containers-storage-overlay-9e918e85573708e626d4a6ef78ac0f0b358f58a6e7b0290d07a7750ef819fadf-merged.mount: Deactivated successfully. Dec 3 09:08:53 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4eed4d27c9b38a76bbef4cc6d71a801da8bb61fd01740cb3c46d5cd5d26de7cf-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:53 np0005543227 systemd[1]: var-lib-containers-storage-overlay-5fd3a76d65de8b854d750985a1b4902af991b3b169a0244d8865fdc7e9beedf4-merged.mount: Deactivated successfully. Dec 3 09:08:53 np0005543227 podman[64159]: 2025-12-03 09:08:53.836735216 +0000 UTC m=+0.035412161 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Dec 3 09:08:53 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:53 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/ef8f2ed40f9ec38a10a94cbd4af506da24f4b999b2924114e0e0152cb32e35d8/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:53 np0005543227 podman[64159]: 2025-12-03 09:08:53.960888208 +0000 UTC m=+0.159565153 container init 07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, io.buildah.version=1.41.4, managed_by=tripleo_ansible, build-date=2025-11-19T00:10:53Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, tcib_managed=true, vcs-type=git, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-heat_api_cfn, version=17.1.12, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, architecture=x86_64, batch=17.1_20251118.1, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., com.redhat.component=openstack-heat-api-cfn-container, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, url=https://www.redhat.com, name=rhosp17/openstack-heat-api-cfn, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn) Dec 3 09:08:53 np0005543227 podman[64159]: 2025-12-03 09:08:53.971165495 +0000 UTC m=+0.169842440 container start 07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, tcib_managed=true, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-heat-api-cfn-container, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-heat-api-cfn, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, managed_by=tripleo_ansible, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.12, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, url=https://www.redhat.com, container_name=container-puppet-heat_api_cfn, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, architecture=x86_64, batch=17.1_20251118.1, build-date=2025-11-19T00:10:53Z) Dec 3 09:08:53 np0005543227 podman[64159]: 2025-12-03 09:08:53.97133946 +0000 UTC m=+0.170016405 container attach 07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.component=openstack-heat-api-cfn-container, url=https://www.redhat.com, build-date=2025-11-19T00:10:53Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, container_name=container-puppet-heat_api_cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, architecture=x86_64, vcs-type=git, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, distribution-scope=public, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vendor=Red Hat, Inc., name=rhosp17/openstack-heat-api-cfn, io.buildah.version=1.41.4, io.openshift.expose-services=, version=17.1.12, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn) Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/username]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/password]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Lvm/Augeas[udev options in lvm.conf]/returns: executed successfully Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Authtoken/Keystone::Resource::Authtoken[glance_api_config]/Glance_api_config[keystone_authtoken/interface]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}f4fe6f8f28e40ae075bc495e8315cd6ba7487200870270aa7aac90867f00f681' Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/debug]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_file]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Logging/Oslo::Log[glance_api_config]/Glance_api_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/api_paste_config]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/storage_availability_zone]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/default_availability_zone]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Policy/Oslo::Policy[glance_api_config]/Glance_api_config[oslo_policy/policy_file]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api::Db/Oslo::Db[glance_api_config]/Glance_api_config[database/connection]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Cinder_config[DEFAULT/enable_v3_api]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Glance/Cinder_config[DEFAULT/glance_api_servers]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/region_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_create_container_on_put]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/interface]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_endpoint_type]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/swift_store_config_file]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/default_swift_reference]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_type]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_api_config[default_backend/store_description]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/key]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_address]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/auth_version]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/user_domain_id]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Backend::Swift/Glance::Backend::Multistore::Swift[default_backend]/Glance_swift_config[ref1/project_domain_id]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/auth_url]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/username]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Rabbit[glance_api_config]/Glance_api_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/user_domain_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/password]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Nova/Cinder_config[nova/project_domain_name]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Cron::Db_purge/Cron[cinder-manage db purge]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_listen]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Default[glance_api_config]/Glance_api_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/osapi_volume_workers]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/default_volume_type]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Notify::Rabbitmq/Oslo::Messaging::Notifications[glance_api_config]/Glance_api_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}32f7d806e6a736ff713fea0c01b7189eff3f1ce778225fedc6cdff8bdbad00ed' Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Api/Cinder_config[DEFAULT/auth_strategy]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Tripleo::Profile::Base::Glance::Api/Tripleo::Tls_proxy[glance-api]/Apache::Vhost[glance-api-proxy]/Concat[25-glance-api-proxy.conf]/File[/etc/httpd/conf.d/25-glance-api-proxy.conf]/ensure: defined content as '{sha256}aa0a6e96cd4a5dfa51a20098da7ec0f00af0c0f99212f6e74585beab412eae33' Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_workers]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Backup/Cinder_config[DEFAULT/backup_max_operations]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_host]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_driver]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/bind_port]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/workers]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/swift_catalog_info]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_image_direct_url]/ensure: created Dec 3 09:08:54 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_swift_container]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_cache_dir]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_import_methods]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Backup::Swift/Cinder_config[DEFAULT/backup_compression_algorithm]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/node_staging_uri]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Scheduler/Cinder_config[DEFAULT/scheduler_driver]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[DEFAULT/enabled_backends]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/image_member_quota]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Backends/Cinder_config[tripleo_iscsi/backend_host]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/connection]/ensure: created Dec 3 09:08:55 np0005543227 ovs-vsctl[64223]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/max_retries]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[64107]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/show_multiple_locations]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[DEFAULT/enabled_backends]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[glance_store/default_backend]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Db/Oslo::Db[cinder_config]/Cinder_config[database/db_max_retries]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[64109]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:55 np0005543227 puppet-user[64109]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_cache_config[DEFAULT/image_cache_dir]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[64109]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:55 np0005543227 puppet-user[64109]: (file & line not available) Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_import_opts/image_import_plugins]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[image_conversion/output_format]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_image_import_config[inject_metadata_properties/ignore_user_roles]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Rabbit[cinder_config]/Cinder_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Glance_api_config[paste_deploy/flavor]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[64109]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:55 np0005543227 puppet-user[64109]: (file & line not available) Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Oslo::Concurrency[glance_api_config]/Glance_api_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: /Stage[main]/Glance::Api/Oslo::Middleware[glance_api_config]/Glance_api_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63346]: Notice: Applied catalog in 1.83 seconds Dec 3 09:08:55 np0005543227 puppet-user[63306]: Notice: Applied catalog in 1.85 seconds Dec 3 09:08:55 np0005543227 puppet-user[63346]: Application: Dec 3 09:08:55 np0005543227 puppet-user[63346]: Initial environment: production Dec 3 09:08:55 np0005543227 puppet-user[63346]: Converged environment: production Dec 3 09:08:55 np0005543227 puppet-user[63346]: Run mode: user Dec 3 09:08:55 np0005543227 puppet-user[63346]: Changes: Dec 3 09:08:55 np0005543227 puppet-user[63346]: Total: 92 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Events: Dec 3 09:08:55 np0005543227 puppet-user[63346]: Success: 92 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Total: 92 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Resources: Dec 3 09:08:55 np0005543227 puppet-user[63346]: Skipped: 36 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Changed: 92 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Out of sync: 92 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Total: 305 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Time: Dec 3 09:08:55 np0005543227 puppet-user[63346]: Concat file: 0.00 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Anchor: 0.00 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Concat fragment: 0.00 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Glance swift config: 0.01 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Glance image import config: 0.01 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Cron: 0.01 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Glance cache config: 0.01 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Augeas: 0.02 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Package: 0.03 Dec 3 09:08:55 np0005543227 puppet-user[63346]: File: 0.11 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Glance api config: 1.41 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Config retrieval: 1.58 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Transaction evaluation: 1.82 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Catalog application: 1.83 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Last run: 1764752935 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Resources: 0.00 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Total: 1.83 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Version: Dec 3 09:08:55 np0005543227 puppet-user[63346]: Config: 1764752931 Dec 3 09:08:55 np0005543227 puppet-user[63346]: Puppet: 7.10.0 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Application: Dec 3 09:08:55 np0005543227 puppet-user[63306]: Initial environment: production Dec 3 09:08:55 np0005543227 puppet-user[63306]: Converged environment: production Dec 3 09:08:55 np0005543227 puppet-user[63306]: Run mode: user Dec 3 09:08:55 np0005543227 puppet-user[63306]: Changes: Dec 3 09:08:55 np0005543227 puppet-user[63306]: Total: 92 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Events: Dec 3 09:08:55 np0005543227 puppet-user[63306]: Success: 92 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Total: 92 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Resources: Dec 3 09:08:55 np0005543227 puppet-user[63306]: Skipped: 36 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Changed: 92 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Out of sync: 92 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Total: 305 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Time: Dec 3 09:08:55 np0005543227 puppet-user[63306]: Concat file: 0.00 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Anchor: 0.00 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Concat fragment: 0.00 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Glance image import config: 0.01 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Glance swift config: 0.01 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Glance cache config: 0.01 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Cron: 0.01 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Augeas: 0.02 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Package: 0.03 Dec 3 09:08:55 np0005543227 puppet-user[63306]: File: 0.11 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Glance api config: 1.42 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Config retrieval: 1.60 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Transaction evaluation: 1.83 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Catalog application: 1.85 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Last run: 1764752935 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Resources: 0.00 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Total: 1.85 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Version: Dec 3 09:08:55 np0005543227 puppet-user[63306]: Config: 1764752931 Dec 3 09:08:55 np0005543227 puppet-user[63306]: Puppet: 7.10.0 Dec 3 09:08:55 np0005543227 puppet-user[64109]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Dec 3 09:08:55 np0005543227 puppet-user[64109]: removed in a future realse. Use heat::db::database_connection instead Dec 3 09:08:55 np0005543227 ovs-vsctl[64314]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/rpc_response_timeout]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Default[cinder_config]/Cinder_config[DEFAULT/control_exchange]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[64107]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:55 np0005543227 puppet-user[64107]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:55 np0005543227 puppet-user[64107]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:55 np0005543227 puppet-user[64107]: (file & line not available) Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Oslo::Messaging::Notifications[cinder_config]/Cinder_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[64191]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:55 np0005543227 puppet-user[64191]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:55 np0005543227 puppet-user[64191]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:55 np0005543227 puppet-user[64191]: (file & line not available) Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder/Oslo::Concurrency[cinder_config]/Cinder_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/debug]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[64191]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:55 np0005543227 puppet-user[64191]: (file & line not available) Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Logging/Oslo::Log[cinder_config]/Cinder_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:55 np0005543227 puppet-user[64107]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:55 np0005543227 puppet-user[64107]: (file & line not available) Dec 3 09:08:55 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_type]/ensure: created Dec 3 09:08:56 np0005543227 systemd[1]: libpod-bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639.scope: Deactivated successfully. Dec 3 09:08:56 np0005543227 systemd[1]: libpod-bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639.scope: Consumed 5.576s CPU time. Dec 3 09:08:56 np0005543227 podman[63198]: 2025-12-03 09:08:56.011196994 +0000 UTC m=+6.109005166 container died bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, tcib_managed=true, io.buildah.version=1.41.4, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, managed_by=tripleo_ansible, build-date=2025-11-18T23:45:01Z, io.openshift.expose-services=, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, summary=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, vcs-type=git, com.redhat.component=openstack-glance-api-container, container_name=container-puppet-glance_api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-glance-api, config_id=tripleo_puppet_step1) Dec 3 09:08:56 np0005543227 systemd[1]: libpod-133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948.scope: Deactivated successfully. Dec 3 09:08:56 np0005543227 systemd[1]: libpod-133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948.scope: Consumed 5.628s CPU time. Dec 3 09:08:56 np0005543227 puppet-user[64191]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Dec 3 09:08:56 np0005543227 puppet-user[64191]: removed in a future realse. Use heat::db::database_connection instead Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/region_name]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/auth_url]/ensure: created Dec 3 09:08:56 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:56 np0005543227 systemd[1]: var-lib-containers-storage-overlay-34d21a426c63b3a9d5e4824a1ba2718baf5a104be179e3ed8df7fac0bb7110b4-merged.mount: Deactivated successfully. Dec 3 09:08:56 np0005543227 podman[64487]: 2025-12-03 09:08:56.077605979 +0000 UTC m=+0.039779876 container died 133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, build-date=2025-11-18T23:45:01Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-glance-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, io.openshift.expose-services=, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-glance_api_internal, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, name=rhosp17/openstack-glance-api, io.buildah.version=1.41.4, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64) Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/username]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/password]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/user_domain_name]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_name]/ensure: created Dec 3 09:08:56 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/project_domain_name]/ensure: created Dec 3 09:08:56 np0005543227 podman[64479]: 2025-12-03 09:08:56.267899207 +0000 UTC m=+0.249862913 container cleanup bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api, com.redhat.component=openstack-glance-api-container, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, build-date=2025-11-18T23:45:01Z, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 glance-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.4, tcib_managed=true, container_name=container-puppet-glance_api, name=rhosp17/openstack-glance-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, vendor=Red Hat, Inc., release=1761123044) Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Service_user/Keystone::Resource::Service_user[cinder_config]/Cinder_config[service_user/send_service_user_token]/ensure: created Dec 3 09:08:56 np0005543227 systemd[1]: libpod-conmon-bdb7ef8acf2ed10905c071a0f6e785a368e15c40d73e9ac5448ee40d495d9639.scope: Deactivated successfully. Dec 3 09:08:56 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api --conmon-pidfile /run/container-puppet-glance_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::glance::api#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::glance::api\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 09:08:56 np0005543227 podman[64487]: 2025-12-03 09:08:56.288943935 +0000 UTC m=+0.251117852 container cleanup 133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948 (image=registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1, name=container-puppet-glance_api_internal, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 glance-api, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 glance-api, io.k8s.description=Red Hat OpenStack Platform 17.1 glance-api, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 glance-api, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, version=17.1.12, com.redhat.component=openstack-glance-api-container, name=rhosp17/openstack-glance-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-glance_api_internal, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-glance-api, release=1761123044, build-date=2025-11-18T23:45:01Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, vendor=Red Hat, Inc., tcib_managed=true, vcs-type=git, distribution-scope=public, config_id=tripleo_puppet_step1) Dec 3 09:08:56 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-glance_api_internal --conmon-pidfile /run/container-puppet-glance_api_internal.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config --env NAME=glance_api_internal --env STEP_CONFIG=include ::tripleo::packages#012class { 'tripleo::profile::base::glance::api':#012 bind_port => 9293,#012 tls_proxy_port => 9293,#012 log_file => '/var/log/glance/api_internal.log',#012 show_image_direct_url => true,#012 show_multiple_locations => true,#012}#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-glance_api_internal --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,glance_api_config,glance_api_paste_ini,glance_swift_config,glance_cache_config,glance_image_import_config', 'NAME': 'glance_api_internal', 'STEP_CONFIG': "include ::tripleo::packages\nclass { 'tripleo::profile::base::glance::api':\n bind_port => 9293,\n tls_proxy_port => 9293,\n log_file => '/var/log/glance/api_internal.log',\n show_image_direct_url => true,\n show_multiple_locations => true,\n}\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-glance_api_internal.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1 Dec 3 09:08:56 np0005543227 systemd[1]: libpod-conmon-133d9b523e41db4e8dcc2a6aed258f0c3c2d0baf4262168d83d143a539d12948.scope: Deactivated successfully. Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64107]: Warning: Scope(Haproxy::Config[haproxy]): haproxy: The $merge_options parameter will default to true in the next major release. Please review the documentation regarding the implications. Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64107]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.73 seconds Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64109]: Warning: Scope(Apache::Vhost[heat_api_wsgi]): Dec 3 09:08:56 np0005543227 puppet-user[64109]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:56 np0005543227 puppet-user[64109]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:56 np0005543227 puppet-user[64109]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:56 np0005543227 puppet-user[64109]: file names. Dec 3 09:08:56 np0005543227 puppet-user[64109]: Dec 3 09:08:56 np0005543227 puppet-user[64109]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:56 np0005543227 puppet-user[64109]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:56 np0005543227 puppet-user[64109]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/username]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/password]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Keystone::Authtoken/Keystone::Resource::Authtoken[cinder_config]/Cinder_config[keystone_authtoken/interface]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Policy/Oslo::Policy[cinder_config]/Cinder_config[oslo_policy/policy_file]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64109]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.41 seconds Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Api/Oslo::Middleware[cinder_config]/Cinder_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[/var/www/cgi-bin/cinder]/group: group changed 'root' to 'cinder' Dec 3 09:08:56 np0005543227 puppet-user[64107]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/content: content changed '{sha256}8afc9a0bcc462f08af54b6ac1cbfc3b8343b1feee00b4ab07d7a8c7b47065f0b' to '{sha256}8e932453f833d0cbea4c85a953db1dc5bd1314b7fe23e9131bcd261a69b4125a' Dec 3 09:08:56 np0005543227 puppet-user[64107]: Notice: /Stage[main]/Haproxy/Haproxy::Instance[haproxy]/Haproxy::Config[haproxy]/Concat[/etc/haproxy/haproxy.cfg]/File[/etc/haproxy/haproxy.cfg]/mode: mode changed '0644' to '0640' Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/File[cinder_wsgi]/ensure: defined content as '{sha256}4edb31cc3eee33c28f8a9c6c47aaad65265bca7f5a84782e4481666691daacea' Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_backend_name]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64107]: Notice: Applied catalog in 0.20 seconds Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volume_driver]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64107]: Application: Dec 3 09:08:56 np0005543227 puppet-user[64107]: Initial environment: production Dec 3 09:08:56 np0005543227 puppet-user[64107]: Converged environment: production Dec 3 09:08:56 np0005543227 puppet-user[64107]: Run mode: user Dec 3 09:08:56 np0005543227 puppet-user[64107]: Changes: Dec 3 09:08:56 np0005543227 puppet-user[64107]: Total: 2 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Events: Dec 3 09:08:56 np0005543227 puppet-user[64107]: Success: 2 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Total: 2 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Resources: Dec 3 09:08:56 np0005543227 puppet-user[64107]: Changed: 1 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Out of sync: 1 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Skipped: 12 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Total: 54 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Time: Dec 3 09:08:56 np0005543227 puppet-user[64107]: Concat file: 0.00 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Concat fragment: 0.00 Dec 3 09:08:56 np0005543227 puppet-user[64107]: File: 0.08 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Transaction evaluation: 0.19 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Catalog application: 0.20 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Config retrieval: 0.80 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Last run: 1764752936 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Total: 0.20 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Version: Dec 3 09:08:56 np0005543227 puppet-user[64107]: Config: 1764752935 Dec 3 09:08:56 np0005543227 puppet-user[64107]: Puppet: 7.10.0 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_ip_address]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_helper]/ensure: created Dec 3 09:08:56 np0005543227 podman[64764]: 2025-12-03 09:08:56.778492227 +0000 UTC m=+0.076924788 container create c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, config_id=tripleo_puppet_step1, com.redhat.component=openstack-heat-api-container, release=1761123044, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, io.buildah.version=1.41.4, vendor=Red Hat, Inc., build-date=2025-11-19T00:11:00Z, vcs-type=git, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 heat-api, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, container_name=container-puppet-heat, architecture=x86_64, io.openshift.expose-services=, name=rhosp17/openstack-heat-api, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, managed_by=tripleo_ansible) Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/volumes_dir]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Tripleo::Profile::Base::Cinder::Volume::Iscsi/Cinder::Backend::Iscsi[tripleo_iscsi]/Cinder_config[tripleo_iscsi/target_protocol]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:08:56 np0005543227 systemd[1]: Started libpod-conmon-c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d.scope. Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:08:56 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:56 np0005543227 podman[64764]: 2025-12-03 09:08:56.733322227 +0000 UTC m=+0.031754788 image pull registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 09:08:56 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/036f2cb732399217bf2ef9a4f6fd3cf875a0828997c8729cef7bd92f2ce2368c/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:08:56 np0005543227 podman[64764]: 2025-12-03 09:08:56.844855861 +0000 UTC m=+0.143288422 container init c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, architecture=x86_64, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-heat-api, batch=17.1_20251118.1, build-date=2025-11-19T00:11:00Z, version=17.1.12, tcib_managed=true, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, container_name=container-puppet-heat, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.component=openstack-heat-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., distribution-scope=public) Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: /Stage[main]/Cinder::Wsgi::Apache/Openstacklib::Wsgi::Apache[cinder_wsgi]/Apache::Vhost[cinder_wsgi]/Concat[10-cinder_wsgi.conf]/File[/etc/httpd/conf.d/10-cinder_wsgi.conf]/ensure: defined content as '{sha256}ac7fe1089b999e599e9ec480f1c77a4d3958726194a55cc6365a98310ceea953' Dec 3 09:08:56 np0005543227 podman[64764]: 2025-12-03 09:08:56.853133096 +0000 UTC m=+0.151565657 container start c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, container_name=container-puppet-heat, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-19T00:11:00Z, config_id=tripleo_puppet_step1, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 heat-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, vendor=Red Hat, Inc., version=17.1.12, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, name=rhosp17/openstack-heat-api, url=https://www.redhat.com, release=1761123044, com.redhat.component=openstack-heat-api-container, architecture=x86_64, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.buildah.version=1.41.4, distribution-scope=public, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, description=Red Hat OpenStack Platform 17.1 heat-api) Dec 3 09:08:56 np0005543227 podman[64764]: 2025-12-03 09:08:56.853425415 +0000 UTC m=+0.151857996 container attach c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, distribution-scope=public, io.openshift.expose-services=, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, name=rhosp17/openstack-heat-api, release=1761123044, container_name=container-puppet-heat, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-heat-api-container, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:11:00Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., version=17.1.12) Dec 3 09:08:56 np0005543227 puppet-user[63373]: Notice: Applied catalog in 3.31 seconds Dec 3 09:08:56 np0005543227 puppet-user[63373]: Application: Dec 3 09:08:56 np0005543227 puppet-user[63373]: Initial environment: production Dec 3 09:08:56 np0005543227 puppet-user[63373]: Converged environment: production Dec 3 09:08:56 np0005543227 puppet-user[63373]: Run mode: user Dec 3 09:08:56 np0005543227 puppet-user[63373]: Changes: Dec 3 09:08:56 np0005543227 puppet-user[63373]: Total: 114 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Events: Dec 3 09:08:56 np0005543227 puppet-user[63373]: Success: 114 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Total: 114 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Resources: Dec 3 09:08:56 np0005543227 puppet-user[63373]: Changed: 114 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Out of sync: 114 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Skipped: 34 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Total: 372 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Time: Dec 3 09:08:56 np0005543227 puppet-user[63373]: Resources: 0.00 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Concat file: 0.00 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Anchor: 0.00 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Concat fragment: 0.00 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Cron: 0.01 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Package: 0.04 Dec 3 09:08:56 np0005543227 puppet-user[63373]: File: 0.12 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Augeas: 0.53 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Config retrieval: 1.63 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Last run: 1764752936 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Cinder config: 2.35 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Transaction evaluation: 3.30 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Catalog application: 3.31 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Total: 3.31 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Version: Dec 3 09:08:56 np0005543227 puppet-user[63373]: Config: 1764752931 Dec 3 09:08:56 np0005543227 puppet-user[63373]: Puppet: 7.10.0 Dec 3 09:08:56 np0005543227 podman[64771]: 2025-12-03 09:08:56.764001191 +0000 UTC m=+0.047879505 image pull registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Dec 3 09:08:56 np0005543227 podman[64771]: 2025-12-03 09:08:56.901427983 +0000 UTC m=+0.185306277 container create 4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 horizon, summary=Red Hat OpenStack Platform 17.1 horizon, config_id=tripleo_puppet_step1, architecture=x86_64, build-date=2025-11-18T23:41:37Z, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, com.redhat.component=openstack-horizon-container, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., name=rhosp17/openstack-horizon, managed_by=tripleo_ansible, batch=17.1_20251118.1, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, container_name=container-puppet-horizon) Dec 3 09:08:56 np0005543227 systemd[1]: Started libpod-conmon-4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45.scope. Dec 3 09:08:56 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:56 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7e82bc90c347aa93514617f85dd4bcb41ce6218217fed49f4fec30701456b8af/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:56 np0005543227 podman[64771]: 2025-12-03 09:08:56.952826865 +0000 UTC m=+0.236705189 container init 4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, io.buildah.version=1.41.4, name=rhosp17/openstack-horizon, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, config_id=tripleo_puppet_step1, architecture=x86_64, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-horizon, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, com.redhat.component=openstack-horizon-container, description=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, build-date=2025-11-18T23:41:37Z, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, distribution-scope=public) Dec 3 09:08:56 np0005543227 podman[64771]: 2025-12-03 09:08:56.968849588 +0000 UTC m=+0.252727902 container start 4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, name=rhosp17/openstack-horizon, build-date=2025-11-18T23:41:37Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 horizon, container_name=container-puppet-horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, version=17.1.12, managed_by=tripleo_ansible, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, io.buildah.version=1.41.4, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, com.redhat.component=openstack-horizon-container, url=https://www.redhat.com, vcs-type=git, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 horizon) Dec 3 09:08:56 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Dec 3 09:08:56 np0005543227 podman[64771]: 2025-12-03 09:08:56.969213339 +0000 UTC m=+0.253091663 container attach 4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 horizon, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, name=rhosp17/openstack-horizon, vcs-type=git, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vendor=Red Hat, Inc., io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-horizon-container, tcib_managed=true, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T23:41:37Z, release=1761123044, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, container_name=container-puppet-horizon) Dec 3 09:08:56 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64191]: Warning: Scope(Apache::Vhost[heat_api_cfn_wsgi]): Dec 3 09:08:56 np0005543227 puppet-user[64191]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:56 np0005543227 puppet-user[64191]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:56 np0005543227 puppet-user[64191]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:56 np0005543227 puppet-user[64191]: file names. Dec 3 09:08:56 np0005543227 puppet-user[64191]: Dec 3 09:08:56 np0005543227 puppet-user[64191]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:56 np0005543227 puppet-user[64191]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:56 np0005543227 puppet-user[64191]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:56 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Dec 3 09:08:56 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Dec 3 09:08:57 np0005543227 systemd[1]: var-lib-containers-storage-overlay-ebafd977d89bba05db5856690fc152a762958af12fceeb3b6c892acb25885af7-merged.mount: Deactivated successfully. Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Dec 3 09:08:57 np0005543227 systemd[1]: libpod-a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d.scope: Deactivated successfully. Dec 3 09:08:57 np0005543227 systemd[1]: libpod-a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d.scope: Consumed 3.463s CPU time. Dec 3 09:08:57 np0005543227 podman[64000]: 2025-12-03 09:08:57.102038459 +0000 UTC m=+3.823322104 container died a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, container_name=container-puppet-haproxy, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, build-date=2025-11-18T22:50:48Z, name=rhosp17/openstack-haproxy, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 haproxy, release=1761123044, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-haproxy-container, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, managed_by=tripleo_ansible, vcs-type=git, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 haproxy, url=https://www.redhat.com, tcib_managed=true, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.32 seconds Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Dec 3 09:08:57 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:57 np0005543227 systemd[1]: var-lib-containers-storage-overlay-f1a75cf11076389b45e12f0833fff8886f0ca79df37eb476f0557b0772d243e5-merged.mount: Deactivated successfully. Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Api/Heat_config[heat_api/bind_host]/ensure: created Dec 3 09:08:57 np0005543227 podman[64861]: 2025-12-03 09:08:57.199423557 +0000 UTC m=+0.083288315 container cleanup a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d (image=registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1, name=container-puppet-haproxy, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 haproxy, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-haproxy, build-date=2025-11-18T22:50:48Z, io.buildah.version=1.41.4, tcib_managed=true, vcs-type=git, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 haproxy, com.redhat.component=openstack-haproxy-container, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-haproxy, summary=Red Hat OpenStack Platform 17.1 haproxy, architecture=x86_64, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 haproxy, distribution-scope=public, name=rhosp17/openstack-haproxy, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:08:57 np0005543227 systemd[1]: libpod-conmon-a82d52f4883402946a8038140d29cba98a909236b655d26e1d1b776e8560eb9d.scope: Deactivated successfully. Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:08:57 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-haproxy --conmon-pidfile /run/container-puppet-haproxy.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,haproxy_config --env NAME=haproxy --env STEP_CONFIG=include ::tripleo::packages#012exec {'wait-for-settle': command => '/bin/true' }#012class tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}#012['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::haproxy_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-haproxy --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,haproxy_config', 'NAME': 'haproxy', 'STEP_CONFIG': "include ::tripleo::packages\nexec {'wait-for-settle': command => '/bin/true' }\nclass tripleo::firewall(){}; define tripleo::firewall::rule( $port = undef, $dport = undef, $sport = undef, $proto = undef, $action = undef, $state = undef, $source = undef, $iniface = undef, $chain = undef, $destination = undef, $extras = undef){}\n['pcmk_bundle', 'pcmk_resource', 'pcmk_property', 'pcmk_constraint', 'pcmk_resource_default'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::haproxy_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro', '/etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro', '/etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-haproxy.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/certs/haproxy:/etc/pki/tls/certs/haproxy:ro --volume /etc/pki/tls/private/haproxy:/etc/pki/tls/private/haproxy:ro --volume /etc/pki/tls/private/overcloud_endpoint.pem:/etc/pki/tls/private/overcloud_endpoint.pem:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Dec 3 09:08:57 np0005543227 podman[64960]: 2025-12-03 09:08:57.604461288 +0000 UTC m=+0.064678823 container create 4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.expose-services=, managed_by=tripleo_ansible, batch=17.1_20251118.1, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, url=https://www.redhat.com, description=Red Hat OpenStack Platform 17.1 iscsid, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, build-date=2025-11-18T23:44:13Z, name=rhosp17/openstack-iscsid, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.component=openstack-iscsid-container, vcs-type=git, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, tcib_managed=true) Dec 3 09:08:57 np0005543227 systemd[1]: libpod-d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627.scope: Deactivated successfully. Dec 3 09:08:57 np0005543227 systemd[1]: libpod-d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627.scope: Consumed 6.909s CPU time. Dec 3 09:08:57 np0005543227 podman[63201]: 2025-12-03 09:08:57.614822747 +0000 UTC m=+7.703718414 container died d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-cinder, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, name=rhosp17/openstack-cinder-api, version=17.1.12, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-19T00:20:06Z, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, release=1761123044, batch=17.1_20251118.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, description=Red Hat OpenStack Platform 17.1 cinder-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-cinder-api-container, distribution-scope=public, io.buildah.version=1.41.4, io.openshift.expose-services=, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 cinder-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc.) Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Api_cfn/Heat_config[heat_api_cfn/bind_host]/ensure: created Dec 3 09:08:57 np0005543227 systemd[1]: Started libpod-conmon-4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74.scope. Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:08:57 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:57 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/333230b13388b9b0a861bb079cfaa14ad49b911b40bf9a9866a96f71133c0151/merged/tmp/iscsi.host supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:57 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/333230b13388b9b0a861bb079cfaa14ad49b911b40bf9a9866a96f71133c0151/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:08:57 np0005543227 podman[64960]: 2025-12-03 09:08:57.648397531 +0000 UTC m=+0.108615076 container init 4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.buildah.version=1.41.4, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-iscsid, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T23:44:13Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, vcs-type=git, tcib_managed=true, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 iscsid, summary=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, release=1761123044, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, vendor=Red Hat, Inc., name=rhosp17/openstack-iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-iscsid-container) Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:08:57 np0005543227 podman[64960]: 2025-12-03 09:08:57.657604684 +0000 UTC m=+0.117822219 container start 4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, io.buildah.version=1.41.4, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, name=rhosp17/openstack-iscsid, io.openshift.expose-services=, container_name=container-puppet-iscsid, version=17.1.12, config_id=tripleo_puppet_step1, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, com.redhat.component=openstack-iscsid-container, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64, vendor=Red Hat, Inc., managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T23:44:13Z, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, release=1761123044, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 iscsid) Dec 3 09:08:57 np0005543227 podman[64960]: 2025-12-03 09:08:57.657786019 +0000 UTC m=+0.118003564 container attach 4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T23:44:13Z, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, distribution-scope=public, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 iscsid, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, url=https://www.redhat.com, tcib_managed=true, io.buildah.version=1.41.4, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-iscsid-container, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, release=1761123044, container_name=container-puppet-iscsid, io.openshift.expose-services=, vcs-type=git, batch=17.1_20251118.1, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team) Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:08:57 np0005543227 podman[64960]: 2025-12-03 09:08:57.575496306 +0000 UTC m=+0.035713851 image pull registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:57 np0005543227 podman[64982]: 2025-12-03 09:08:57.760061059 +0000 UTC m=+0.131961765 container cleanup d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627 (image=registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1, name=container-puppet-cinder, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cinder-api, org.opencontainers.image.revision=23e4714150e7d60dd5666201ba953f6e33f61711, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cinder-api, maintainer=OpenStack TripleO Team, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cinder-api, vendor=Red Hat, Inc., build-date=2025-11-19T00:20:06Z, vcs-ref=23e4714150e7d60dd5666201ba953f6e33f61711, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, config_id=tripleo_puppet_step1, name=rhosp17/openstack-cinder-api, io.buildah.version=1.41.4, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 cinder-api, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, description=Red Hat OpenStack Platform 17.1 cinder-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, url=https://www.redhat.com, version=17.1.12, architecture=x86_64, container_name=container-puppet-cinder, com.redhat.component=openstack-cinder-api-container) Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:08:57 np0005543227 systemd[1]: libpod-conmon-d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627.scope: Deactivated successfully. Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:08:57 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-cinder --conmon-pidfile /run/container-puppet-cinder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line --env NAME=cinder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::cinder::api#012include tripleo::profile::base::database::mysql::client#012#012include tripleo::profile::base::cinder::backup::swift#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::cinder::backup_bundle#012include tripleo::profile::base::cinder::scheduler#012#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::lvm#012include tripleo::profile::pacemaker::cinder::volume_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-cinder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,cinder_config,file,concat,file_line,cinder_api_paste_ini,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line,cinder_config,file,concat,file_line', 'NAME': 'cinder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::cinder::api\ninclude tripleo::profile::base::database::mysql::client\n\ninclude tripleo::profile::base::cinder::backup::swift\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::cinder::backup_bundle\ninclude tripleo::profile::base::cinder::scheduler\n\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::lvm\ninclude tripleo::profile::pacemaker::cinder::volume_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-cinder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1 Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}80f0105d16abacbd0ab408ceffd5c52af00d296036bc67f7d7c18a3264f3ae63' Dec 3 09:08:57 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:08:58 np0005543227 systemd[1]: var-lib-containers-storage-overlay-9f3e3cdc9fd90125a32d6afef410eecfafe8a5f65329f25cf9b155565bc40c3f-merged.mount: Deactivated successfully. Dec 3 09:08:58 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d111402100ca929a2dc37d7a96f15f4816acc7e1c0592a0b24b4b6c6f3a5b627-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/File[heat_api_wsgi]/ensure: defined content as '{sha256}63c23a972f142aef4c001999d58b5cb122b43aa3aebf0785080bcc6e56385a66' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: /Stage[main]/Heat::Wsgi::Apache_api/Heat::Wsgi::Apache[api]/Openstacklib::Wsgi::Apache[heat_api_wsgi]/Apache::Vhost[heat_api_wsgi]/Concat[10-heat_api_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_wsgi.conf]/ensure: defined content as '{sha256}b6fd2ef17e6e591968152fbe0dcf0efc1f52cd4a686cccc60a4f205a15d5723c' Dec 3 09:08:58 np0005543227 puppet-user[64109]: Notice: Applied catalog in 1.27 seconds Dec 3 09:08:58 np0005543227 puppet-user[64109]: Application: Dec 3 09:08:58 np0005543227 puppet-user[64109]: Initial environment: production Dec 3 09:08:58 np0005543227 puppet-user[64109]: Converged environment: production Dec 3 09:08:58 np0005543227 puppet-user[64109]: Run mode: user Dec 3 09:08:58 np0005543227 puppet-user[64109]: Changes: Dec 3 09:08:58 np0005543227 puppet-user[64109]: Total: 89 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Events: Dec 3 09:08:58 np0005543227 puppet-user[64109]: Success: 89 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Total: 89 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Resources: Dec 3 09:08:58 np0005543227 puppet-user[64109]: Skipped: 31 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Changed: 89 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Out of sync: 89 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Total: 331 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Time: Dec 3 09:08:58 np0005543227 puppet-user[64109]: Concat file: 0.00 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Anchor: 0.00 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Concat fragment: 0.00 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Cron: 0.02 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Package: 0.03 Dec 3 09:08:58 np0005543227 puppet-user[64109]: File: 0.10 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Heat config: 0.88 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Transaction evaluation: 1.26 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Catalog application: 1.27 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Config retrieval: 1.61 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Last run: 1764752938 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Resources: 0.00 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Total: 1.27 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Version: Dec 3 09:08:58 np0005543227 puppet-user[64109]: Config: 1764752935 Dec 3 09:08:58 np0005543227 puppet-user[64109]: Puppet: 7.10.0 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Dec 3 09:08:58 np0005543227 podman[65073]: 2025-12-03 09:08:58.225897521 +0000 UTC m=+0.084978757 container create de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, container_name=container-puppet-keystone, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, url=https://www.redhat.com, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, config_id=tripleo_puppet_step1, distribution-scope=public, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.expose-services=, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, version=17.1.12, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 keystone, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-keystone, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20251118.1, com.redhat.component=openstack-keystone-container, build-date=2025-11-18T23:45:30Z, summary=Red Hat OpenStack Platform 17.1 keystone) Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Dec 3 09:08:58 np0005543227 systemd[1]: Started libpod-conmon-de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb.scope. Dec 3 09:08:58 np0005543227 podman[65073]: 2025-12-03 09:08:58.182927828 +0000 UTC m=+0.042009024 image pull registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Dec 3 09:08:58 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Dec 3 09:08:58 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/6a17edec0cd646ee0676d57e76028f3f29f2cee41671ba54ef111d93c44b49d4/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:58 np0005543227 podman[65073]: 2025-12-03 09:08:58.303352496 +0000 UTC m=+0.162433722 container init de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, com.redhat.component=openstack-keystone-container, description=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 keystone, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, container_name=container-puppet-keystone, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, name=rhosp17/openstack-keystone, build-date=2025-11-18T23:45:30Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, architecture=x86_64, config_id=tripleo_puppet_step1, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, version=17.1.12, distribution-scope=public) Dec 3 09:08:58 np0005543227 podman[65073]: 2025-12-03 09:08:58.31292932 +0000 UTC m=+0.172010556 container start de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, managed_by=tripleo_ansible, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 keystone, version=17.1.12, build-date=2025-11-18T23:45:30Z, io.buildah.version=1.41.4, container_name=container-puppet-keystone, vendor=Red Hat, Inc., distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, com.redhat.component=openstack-keystone-container, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, batch=17.1_20251118.1, name=rhosp17/openstack-keystone, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 keystone, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64, config_id=tripleo_puppet_step1, vcs-type=git) Dec 3 09:08:58 np0005543227 podman[65073]: 2025-12-03 09:08:58.314591582 +0000 UTC m=+0.173672808 container attach de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, vendor=Red Hat, Inc., vcs-type=git, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 keystone, build-date=2025-11-18T23:45:30Z, container_name=container-puppet-keystone, com.redhat.component=openstack-keystone-container, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, io.openshift.expose-services=, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, version=17.1.12, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, name=rhosp17/openstack-keystone, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, architecture=x86_64) Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}9b060a0cb9074472babd05cae42250e7198d0a7e81b08e78f7dd9183459496e1' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[/var/www/cgi-bin/heat]/ensure: created Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/File[heat_api_cfn_wsgi]/ensure: defined content as '{sha256}00dfd79a2e891b11ddd21cb5ce9d8c56f440a274b42eb9e7e9616c7c7e326582' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: /Stage[main]/Heat::Wsgi::Apache_api_cfn/Heat::Wsgi::Apache[api_cfn]/Openstacklib::Wsgi::Apache[heat_api_cfn_wsgi]/Apache::Vhost[heat_api_cfn_wsgi]/Concat[10-heat_api_cfn_wsgi.conf]/File[/etc/httpd/conf.d/10-heat_api_cfn_wsgi.conf]/ensure: defined content as '{sha256}54cc7ba8d3d7eb33f285ac83d33744ebee54c169f5e94416103b99fb53b865d3' Dec 3 09:08:58 np0005543227 puppet-user[64191]: Notice: Applied catalog in 1.24 seconds Dec 3 09:08:58 np0005543227 puppet-user[64191]: Application: Dec 3 09:08:58 np0005543227 puppet-user[64191]: Initial environment: production Dec 3 09:08:58 np0005543227 puppet-user[64191]: Converged environment: production Dec 3 09:08:58 np0005543227 puppet-user[64191]: Run mode: user Dec 3 09:08:58 np0005543227 puppet-user[64191]: Changes: Dec 3 09:08:58 np0005543227 puppet-user[64191]: Total: 90 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Events: Dec 3 09:08:58 np0005543227 puppet-user[64191]: Success: 90 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Total: 90 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Resources: Dec 3 09:08:58 np0005543227 puppet-user[64191]: Skipped: 32 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Changed: 90 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Out of sync: 90 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Total: 333 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Time: Dec 3 09:08:58 np0005543227 puppet-user[64191]: Concat file: 0.00 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Anchor: 0.00 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Concat fragment: 0.00 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Cron: 0.02 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Package: 0.03 Dec 3 09:08:58 np0005543227 puppet-user[64191]: File: 0.11 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Heat config: 0.78 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Transaction evaluation: 1.22 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Catalog application: 1.24 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Config retrieval: 1.51 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Last run: 1764752938 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Resources: 0.00 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Total: 1.24 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Version: Dec 3 09:08:58 np0005543227 puppet-user[64191]: Config: 1764752935 Dec 3 09:08:58 np0005543227 puppet-user[64191]: Puppet: 7.10.0 Dec 3 09:08:58 np0005543227 ovs-vsctl[65138]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:08:58 np0005543227 systemd[1]: libpod-9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e.scope: Deactivated successfully. Dec 3 09:08:58 np0005543227 systemd[1]: libpod-9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e.scope: Consumed 4.980s CPU time. Dec 3 09:08:58 np0005543227 puppet-user[64815]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:58 np0005543227 puppet-user[64815]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:58 np0005543227 puppet-user[64815]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:58 np0005543227 puppet-user[64815]: (file & line not available) Dec 3 09:08:58 np0005543227 podman[64050]: 2025-12-03 09:08:58.822329454 +0000 UTC m=+5.456297551 container died 9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, name=rhosp17/openstack-heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, summary=Red Hat OpenStack Platform 17.1 heat-api, architecture=x86_64, release=1761123044, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, url=https://www.redhat.com, distribution-scope=public, tcib_managed=true, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, vcs-type=git, build-date=2025-11-19T00:11:00Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-heat_api, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.buildah.version=1.41.4, com.redhat.component=openstack-heat-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., io.openshift.expose-services=) Dec 3 09:08:58 np0005543227 puppet-user[64815]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:58 np0005543227 puppet-user[64815]: (file & line not available) Dec 3 09:08:58 np0005543227 puppet-user[64849]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:58 np0005543227 puppet-user[64849]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:58 np0005543227 puppet-user[64849]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:58 np0005543227 puppet-user[64849]: (file & line not available) Dec 3 09:08:58 np0005543227 puppet-user[64849]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:58 np0005543227 puppet-user[64849]: (file & line not available) Dec 3 09:08:58 np0005543227 podman[65276]: 2025-12-03 09:08:58.981875876 +0000 UTC m=+0.149373121 container cleanup 9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat_api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, com.redhat.component=openstack-heat-api-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, build-date=2025-11-19T00:11:00Z, io.buildah.version=1.41.4, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, tcib_managed=true, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, url=https://www.redhat.com, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 heat-api, summary=Red Hat OpenStack Platform 17.1 heat-api, name=rhosp17/openstack-heat-api, config_id=tripleo_puppet_step1, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-heat_api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, version=17.1.12, vendor=Red Hat, Inc., batch=17.1_20251118.1) Dec 3 09:08:58 np0005543227 systemd[1]: libpod-conmon-9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e.scope: Deactivated successfully. Dec 3 09:08:58 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api --conmon-pidfile /run/container-puppet-heat_api.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini --env NAME=heat_api --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line,heat_api_paste_ini', 'NAME': 'heat_api', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 09:08:59 np0005543227 puppet-user[64815]: Warning: Scope(Class[Heat]): The database_connection parameter is deprecated and will be \ Dec 3 09:08:59 np0005543227 puppet-user[64815]: removed in a future realse. Use heat::db::database_connection instead Dec 3 09:08:59 np0005543227 systemd[1]: var-lib-containers-storage-overlay-d5ac5beb5a877242d99fb7c7937f61abb9e0187aef0fc9139b483fa34eccd56f-merged.mount: Deactivated successfully. Dec 3 09:08:59 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-9489c882d96145ae99141c480440a168fd5b9f9dc543abc245d7a092bbd3487e-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:59 np0005543227 systemd[1]: libpod-07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e.scope: Deactivated successfully. Dec 3 09:08:59 np0005543227 systemd[1]: libpod-07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e.scope: Consumed 4.971s CPU time. Dec 3 09:08:59 np0005543227 podman[64159]: 2025-12-03 09:08:59.208965658 +0000 UTC m=+5.407642613 container died 07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, container_name=container-puppet-heat_api_cfn, vendor=Red Hat, Inc., batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, build-date=2025-11-19T00:10:53Z, com.redhat.component=openstack-heat-api-cfn-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, release=1761123044, vcs-type=git, name=rhosp17/openstack-heat-api-cfn, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, io.buildah.version=1.41.4) Dec 3 09:08:59 np0005543227 systemd[1]: tmp-crun.0zQcVs.mount: Deactivated successfully. Dec 3 09:08:59 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e-userdata-shm.mount: Deactivated successfully. Dec 3 09:08:59 np0005543227 puppet-user[64849]: Warning: This parameter is deprecated, please use `internal_proxy`. at ["/etc/puppet/modules/apache/manifests/mod/remoteip.pp", 77]:["/etc/puppet/modules/tripleo/manifests/profile/base/horizon.pp", 103] Dec 3 09:08:59 np0005543227 puppet-user[64849]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Dec 3 09:08:59 np0005543227 podman[65359]: 2025-12-03 09:08:59.389887987 +0000 UTC m=+0.174309587 container cleanup 07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1, name=container-puppet-heat_api_cfn, container_name=container-puppet-heat_api_cfn, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, summary=Red Hat OpenStack Platform 17.1 heat-api-cfn, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 heat-api-cfn, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api-cfn, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, tcib_managed=true, version=17.1.12, vendor=Red Hat, Inc., vcs-type=git, com.redhat.component=openstack-heat-api-cfn-container, url=https://www.redhat.com, build-date=2025-11-19T00:10:53Z, io.buildah.version=1.41.4, name=rhosp17/openstack-heat-api-cfn, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api-cfn, config_id=tripleo_puppet_step1, distribution-scope=public) Dec 3 09:08:59 np0005543227 systemd[1]: libpod-conmon-07401503a9769490a81657cf6045abc15c67b390f7285b3fa924a211acd11b0e.scope: Deactivated successfully. Dec 3 09:08:59 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat_api_cfn --conmon-pidfile /run/container-puppet-heat_api_cfn.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat_api_cfn --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::api_cfn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat_api_cfn --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat_api_cfn', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::api_cfn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat_api_cfn.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn:17.1 Dec 3 09:08:59 np0005543227 podman[65386]: 2025-12-03 09:08:59.441208828 +0000 UTC m=+0.134458781 container create ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, build-date=2025-11-19T00:21:10Z, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, container_name=container-puppet-manila, description=Red Hat OpenStack Platform 17.1 manila-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, distribution-scope=public, vcs-type=git, com.redhat.component=openstack-manila-api-container, name=rhosp17/openstack-manila-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, version=17.1.12, tcib_managed=true, url=https://www.redhat.com, vendor=Red Hat, Inc., batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, config_id=tripleo_puppet_step1, io.openshift.expose-services=, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:08:59 np0005543227 podman[65386]: 2025-12-03 09:08:59.349769122 +0000 UTC m=+0.043019115 image pull registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Dec 3 09:08:59 np0005543227 systemd[1]: Started libpod-conmon-ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315.scope. Dec 3 09:08:59 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:59 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/75bc018be98d804c2e708a54978ec29ce878a7f547e75a8ecd056b9fbb6f0d4a/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:59 np0005543227 podman[65386]: 2025-12-03 09:08:59.49911361 +0000 UTC m=+0.192363553 container init ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, summary=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, distribution-scope=public, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-manila-api-container, release=1761123044, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, container_name=container-puppet-manila, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, tcib_managed=true, build-date=2025-11-19T00:21:10Z, architecture=x86_64, io.buildah.version=1.41.4, vcs-type=git, name=rhosp17/openstack-manila-api, description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api) Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.71 seconds Dec 3 09:08:59 np0005543227 podman[65386]: 2025-12-03 09:08:59.514239486 +0000 UTC m=+0.207489449 container start ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, container_name=container-puppet-manila, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, release=1761123044, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.component=openstack-manila-api-container, name=rhosp17/openstack-manila-api, managed_by=tripleo_ansible, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 manila-api, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, tcib_managed=true, build-date=2025-11-19T00:21:10Z, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4) Dec 3 09:08:59 np0005543227 podman[65386]: 2025-12-03 09:08:59.514401781 +0000 UTC m=+0.207651744 container attach ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, vcs-type=git, container_name=container-puppet-manila, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 manila-api, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, com.redhat.component=openstack-manila-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, build-date=2025-11-19T00:21:10Z, summary=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.12, name=rhosp17/openstack-manila-api, distribution-scope=public) Dec 3 09:08:59 np0005543227 puppet-user[64849]: Warning: Scope(Apache::Vhost[horizon_vhost]): Dec 3 09:08:59 np0005543227 puppet-user[64849]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:59 np0005543227 puppet-user[64849]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:59 np0005543227 puppet-user[64849]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:59 np0005543227 puppet-user[64849]: file names. Dec 3 09:08:59 np0005543227 puppet-user[64849]: Dec 3 09:08:59 np0005543227 puppet-user[64849]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:59 np0005543227 puppet-user[64849]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:59 np0005543227 puppet-user[64849]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:59 np0005543227 puppet-user[65011]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:08:59 np0005543227 puppet-user[65011]: (file: /etc/puppet/hiera.yaml) Dec 3 09:08:59 np0005543227 puppet-user[65011]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:08:59 np0005543227 puppet-user[65011]: (file & line not available) Dec 3 09:08:59 np0005543227 puppet-user[64849]: Warning: Scope(Apache::Vhost[horizon_ssl_vhost]): Dec 3 09:08:59 np0005543227 puppet-user[64849]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:08:59 np0005543227 puppet-user[64849]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:08:59 np0005543227 puppet-user[64849]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:08:59 np0005543227 puppet-user[64849]: file names. Dec 3 09:08:59 np0005543227 puppet-user[64849]: Dec 3 09:08:59 np0005543227 puppet-user[64849]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:08:59 np0005543227 puppet-user[64849]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:08:59 np0005543227 puppet-user[64849]: sanitized $servername parameter when not explicitly defined. Dec 3 09:08:59 np0005543227 puppet-user[65011]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:08:59 np0005543227 puppet-user[65011]: (file & line not available) Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_domain_admin_password]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Domain/Heat_config[DEFAULT/stack_user_domain_name]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_type]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[trustee/auth_url]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[trustee/username]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[trustee/password]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[trustee/project_domain_name]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[trustee/user_domain_name]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[65011]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.11 seconds Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/max_json_body_size]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[DEFAULT/region_name_for_services]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[ec2authtoken/auth_uri]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[yaql/limit_iterators]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Heat_config[yaql/memory_quota]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.91 seconds Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Cache/Heat_config[resource_finder_cache/caching]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[65011]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[reset-iscsi-initiator-name]/returns: executed successfully Dec 3 09:08:59 np0005543227 puppet-user[65011]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/File[/etc/iscsi/.initiator_reset]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Cron::Purge_deleted/Cron[heat-manage purge_deleted]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[65011]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Exec[sync-iqn-to-host]/returns: executed successfully Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/auth_encryption_key]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_metadata_server_url]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/heat_waitcondition_server_url]/ensure: created Dec 3 09:08:59 np0005543227 podman[65547]: 2025-12-03 09:08:59.848816387 +0000 UTC m=+0.080747297 container create 2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, distribution-scope=public, com.redhat.component=openstack-memcached-container, architecture=x86_64, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T22:49:49Z, vcs-type=git, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, description=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, vendor=Red Hat, Inc., managed_by=tripleo_ansible, container_name=container-puppet-memcached, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=) Dec 3 09:08:59 np0005543227 systemd[1]: Started libpod-conmon-2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6.scope. Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/trusts_delegated_roles]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_resources_per_stack]/ensure: created Dec 3 09:08:59 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:08:59 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/4bced37bd0351a96af93d1a4311e341e9fc28f97419f49b53f31dd8076e661ed/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/num_engine_workers]/ensure: created Dec 3 09:08:59 np0005543227 podman[65547]: 2025-12-03 09:08:59.804993148 +0000 UTC m=+0.036924108 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/convergence_engine]/ensure: created Dec 3 09:08:59 np0005543227 podman[65547]: 2025-12-03 09:08:59.907775052 +0000 UTC m=+0.139705962 container init 2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., url=https://www.redhat.com, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.component=openstack-memcached-container, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, container_name=container-puppet-memcached, description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, maintainer=OpenStack TripleO Team) Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/reauthentication_auth_method]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:08:59 np0005543227 podman[65547]: 2025-12-03 09:08:59.921958119 +0000 UTC m=+0.153889029 container start 2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 memcached, build-date=2025-11-18T22:49:49Z, vendor=Red Hat, Inc., version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, com.redhat.component=openstack-memcached-container, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, name=rhosp17/openstack-memcached, summary=Red Hat OpenStack Platform 17.1 memcached, distribution-scope=public, maintainer=OpenStack TripleO Team, container_name=container-puppet-memcached, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, config_id=tripleo_puppet_step1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git) Dec 3 09:08:59 np0005543227 podman[65547]: 2025-12-03 09:08:59.922137484 +0000 UTC m=+0.154068394 container attach 2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, build-date=2025-11-18T22:49:49Z, vendor=Red Hat, Inc., distribution-scope=public, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, tcib_managed=true, io.buildah.version=1.41.4, architecture=x86_64, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, name=rhosp17/openstack-memcached, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, com.redhat.component=openstack-memcached-container, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 memcached, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-memcached) Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/max_nested_stack_depth]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Remoteip/File[remoteip.conf]/ensure: defined content as '{sha256}9c8d4355af8c0547dc87c380e06a19f272a0bd3fac83afce5f8eb116cf574c2e' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon/File[/etc/openstack-dashboard/local_settings.d]/mode: mode changed '0750' to '0755' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon]/mode: mode changed '0750' to '0751' Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Engine/Heat_config[DEFAULT/client_retry_limit]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/var/log/horizon/horizon.log]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}4af87ae775a58e76b8f50924dd91469a2c2507a5e9d29b1985570cd73ba32587' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:08:59 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Remoteip/Apache::Mod[remoteip]/File[remoteip.load]/ensure: defined content as '{sha256}3977211787f6c6bf5629e4156b32d1dc95c37bc640452d0027b2bc9b1ec9f2d7' Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon/Concat[/etc/openstack-dashboard/local_settings]/File[/etc/openstack-dashboard/local_settings]/content: content changed '{sha256}bb0e13a0afbf37de0b90c300eea7d75d3db826936a1effc1acf58205f154b6f2' to '{sha256}1906da1472f70aacac213f4c59658958b25a9eec48f9f8ae0d61aa6f2cb8c8ba' Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon::Wsgi::Apache/File[/etc/httpd/conf.d/openstack-dashboard.conf]/content: content changed '{sha256}2674ec0a2b4f3412930e918216e5698d5bc877be4364105136866cad3f2ae4bb' to '{sha256}5c3c01834d94a99528a118d4a02978297ac0bf0250e0729c7e4bbd47d4865680' Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Alias/File[alias.conf]/ensure: defined content as '{sha256}8c17a7de4a27d92b2aca6b156dca9e26b9e0bf31b8cc43f63c971aeed09d4e54' Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon::Dashboards::Heat/Concat[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/File[/etc/openstack-dashboard/local_settings.d/_1699_orchestration_settings.py]/ensure: defined content as '{sha256}dd44da5c856beb5e53df88fc72180a79669b73c9c04d487b5033290279692113' Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/content: content changed '{sha256}30de7bbf440460cde78da0e2cf1cab2404921ef0b0e926f5ebaaf973dc4252c5' to '{sha256}838e0d57b7536ffc538afd2e4d916f26ccb29380c13563d0f1ef51d676112c34' Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/group: group changed 'root' to 'apache' Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon::Dashboards::Manila/Concat[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/File[/etc/openstack-dashboard/local_settings.d/_90_manila_shares.py]/mode: mode changed '0644' to '0640' Dec 3 09:09:00 np0005543227 systemd[1]: var-lib-containers-storage-overlay-ef8f2ed40f9ec38a10a94cbd4af506da24f4b999b2924114e0e0152cb32e35d8-merged.mount: Deactivated successfully. Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache::Mod::Alias/Apache::Mod[alias]/File[alias.load]/ensure: defined content as '{sha256}824016275330b45fd8bd04b07792de5f9aaa337f8272bfc01c5b57bb515fc9b4' Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Keystone::Authtoken/Keystone::Resource::Authtoken[heat_config]/Heat_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_vhost]/Concat[10-horizon_vhost.conf]/File[/etc/httpd/conf.d/10-horizon_vhost.conf]/ensure: defined content as '{sha256}a57664fe50b5a11e73689edeacb1c0087fb373edd30b450dfd3bffcc89c8e58e' Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: /Stage[main]/Horizon::Wsgi::Apache/Apache::Vhost[horizon_ssl_vhost]/Concat[15-horizon_ssl_vhost.conf]/File[/etc/httpd/conf.d/15-horizon_ssl_vhost.conf]/ensure: defined content as '{sha256}a6295691d9659ecfb9b62f71d561a6efd2d8a29fbb866fd996d6e834623f32da' Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/connection]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64849]: Notice: Applied catalog in 0.30 seconds Dec 3 09:09:00 np0005543227 puppet-user[64849]: Application: Dec 3 09:09:00 np0005543227 puppet-user[64849]: Initial environment: production Dec 3 09:09:00 np0005543227 puppet-user[64849]: Converged environment: production Dec 3 09:09:00 np0005543227 puppet-user[64849]: Run mode: user Dec 3 09:09:00 np0005543227 puppet-user[64849]: Changes: Dec 3 09:09:00 np0005543227 puppet-user[64849]: Total: 50 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Events: Dec 3 09:09:00 np0005543227 puppet-user[64849]: Success: 50 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Total: 50 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Resources: Dec 3 09:09:00 np0005543227 puppet-user[64849]: Skipped: 33 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Changed: 48 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Out of sync: 48 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Total: 140 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Time: Dec 3 09:09:00 np0005543227 puppet-user[64849]: Concat file: 0.00 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Concat fragment: 0.00 Dec 3 09:09:00 np0005543227 puppet-user[64849]: File: 0.15 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Transaction evaluation: 0.29 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Catalog application: 0.30 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Config retrieval: 0.99 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Last run: 1764752940 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Total: 0.30 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Version: Dec 3 09:09:00 np0005543227 puppet-user[64849]: Config: 1764752938 Dec 3 09:09:00 np0005543227 puppet-user[64849]: Puppet: 7.10.0 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/max_retries]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Db/Oslo::Db[heat_config]/Heat_config[database/db_max_retries]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[65011]: Notice: /Stage[main]/Tripleo::Profile::Base::Iscsid/Augeas[chap_algs in /etc/iscsi/iscsid.conf]/returns: executed successfully Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Oslo::Messaging::Rabbit[heat_config]/Heat_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[65011]: Notice: Applied catalog in 0.49 seconds Dec 3 09:09:00 np0005543227 puppet-user[65011]: Application: Dec 3 09:09:00 np0005543227 puppet-user[65011]: Initial environment: production Dec 3 09:09:00 np0005543227 puppet-user[65011]: Converged environment: production Dec 3 09:09:00 np0005543227 puppet-user[65011]: Run mode: user Dec 3 09:09:00 np0005543227 puppet-user[65011]: Changes: Dec 3 09:09:00 np0005543227 puppet-user[65011]: Total: 4 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Events: Dec 3 09:09:00 np0005543227 puppet-user[65011]: Success: 4 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Total: 4 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Resources: Dec 3 09:09:00 np0005543227 puppet-user[65011]: Changed: 4 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Out of sync: 4 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Skipped: 8 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Total: 13 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Time: Dec 3 09:09:00 np0005543227 puppet-user[65011]: File: 0.00 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Exec: 0.06 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Config retrieval: 0.14 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Augeas: 0.41 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Transaction evaluation: 0.48 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Catalog application: 0.49 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Last run: 1764752940 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Total: 0.49 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Version: Dec 3 09:09:00 np0005543227 puppet-user[65011]: Config: 1764752939 Dec 3 09:09:00 np0005543227 puppet-user[65011]: Puppet: 7.10.0 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Oslo::Messaging::Notifications[heat_config]/Heat_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/rpc_response_timeout]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Oslo::Messaging::Default[heat_config]/Heat_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat/Oslo::Middleware[heat_config]/Heat_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[65106]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:00 np0005543227 puppet-user[65106]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:00 np0005543227 puppet-user[65106]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:00 np0005543227 puppet-user[65106]: (file & line not available) Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/expose_headers]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/max_age]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Cors/Oslo::Cors[heat_config]/Heat_config[cors/allow_headers]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/debug]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Logging/Oslo::Log[heat_config]/Heat_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[65106]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:00 np0005543227 puppet-user[65106]: (file & line not available) Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/backend]/ensure: created Dec 3 09:09:00 np0005543227 systemd[1]: libpod-4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74.scope: Deactivated successfully. Dec 3 09:09:00 np0005543227 systemd[1]: libpod-4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74.scope: Consumed 2.625s CPU time. Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/enabled]/ensure: created Dec 3 09:09:00 np0005543227 podman[64960]: 2025-12-03 09:09:00.511343696 +0000 UTC m=+2.971561321 container died 4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, container_name=container-puppet-iscsid, description=Red Hat OpenStack Platform 17.1 iscsid, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-iscsid, distribution-scope=public, release=1761123044, io.openshift.expose-services=, architecture=x86_64, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, vcs-type=git, vendor=Red Hat, Inc., org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, io.buildah.version=1.41.4, com.redhat.component=openstack-iscsid-container, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 iscsid, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, build-date=2025-11-18T23:44:13Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid) Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/memcache_servers]/ensure: created Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Cache/Oslo::Cache[heat_config]/Heat_config[cache/tls_enabled]/ensure: created Dec 3 09:09:00 np0005543227 systemd[1]: tmp-crun.re1MN4.mount: Deactivated successfully. Dec 3 09:09:00 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:00 np0005543227 podman[65702]: 2025-12-03 09:09:00.630756701 +0000 UTC m=+0.109288335 container cleanup 4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74 (image=registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1, name=container-puppet-iscsid, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, build-date=2025-11-18T23:44:13Z, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-iscsid, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 iscsid, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 iscsid, config_id=tripleo_puppet_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 iscsid, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-iscsid, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, vendor=Red Hat, Inc., vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, url=https://www.redhat.com, batch=17.1_20251118.1, container_name=container-puppet-iscsid, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 iscsid, vcs-type=git, com.redhat.component=openstack-iscsid-container) Dec 3 09:09:00 np0005543227 systemd[1]: libpod-conmon-4c3935bfcdf88e665028f4680e05c63f89ee38883fa2882bdd61f4bdbb9d3d74.scope: Deactivated successfully. Dec 3 09:09:00 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-iscsid --conmon-pidfile /run/container-puppet-iscsid.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,iscsid_config --env NAME=iscsid --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::iscsid#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-iscsid --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,iscsid_config', 'NAME': 'iscsid', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::iscsid\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/iscsi:/tmp/iscsi.host:z', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-iscsid.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/iscsi:/tmp/iscsi.host:z --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-iscsid:17.1 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: /Stage[main]/Heat::Policy/Oslo::Policy[heat_config]/Heat_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:00 np0005543227 systemd[1]: libpod-4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45.scope: Deactivated successfully. Dec 3 09:09:00 np0005543227 systemd[1]: libpod-4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45.scope: Consumed 3.451s CPU time. Dec 3 09:09:00 np0005543227 podman[64771]: 2025-12-03 09:09:00.675178469 +0000 UTC m=+3.959056813 container died 4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, io.openshift.expose-services=, tcib_managed=true, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., io.buildah.version=1.41.4, vcs-type=git, com.redhat.component=openstack-horizon-container, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, build-date=2025-11-18T23:41:37Z, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 horizon, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-horizon, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, name=rhosp17/openstack-horizon, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon) Dec 3 09:09:00 np0005543227 puppet-user[64815]: Notice: Applied catalog in 1.09 seconds Dec 3 09:09:00 np0005543227 puppet-user[64815]: Application: Dec 3 09:09:00 np0005543227 puppet-user[64815]: Initial environment: production Dec 3 09:09:00 np0005543227 puppet-user[64815]: Converged environment: production Dec 3 09:09:00 np0005543227 puppet-user[64815]: Run mode: user Dec 3 09:09:00 np0005543227 puppet-user[64815]: Changes: Dec 3 09:09:00 np0005543227 puppet-user[64815]: Total: 61 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Events: Dec 3 09:09:00 np0005543227 puppet-user[64815]: Success: 61 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Total: 61 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Resources: Dec 3 09:09:00 np0005543227 puppet-user[64815]: Skipped: 21 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Changed: 61 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Out of sync: 61 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Total: 259 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Time: Dec 3 09:09:00 np0005543227 puppet-user[64815]: Anchor: 0.00 Dec 3 09:09:00 np0005543227 puppet-user[64815]: File: 0.00 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Cron: 0.01 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Augeas: 0.02 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Package: 0.03 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Config retrieval: 0.82 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Heat config: 0.91 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Transaction evaluation: 1.08 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Catalog application: 1.09 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Last run: 1764752940 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Resources: 0.00 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Total: 1.09 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Version: Dec 3 09:09:00 np0005543227 puppet-user[64815]: Config: 1764752938 Dec 3 09:09:00 np0005543227 puppet-user[64815]: Puppet: 7.10.0 Dec 3 09:09:00 np0005543227 puppet-user[65106]: Notice: Accepting previously invalid value for target type 'Enum['sql', 'template']' Dec 3 09:09:00 np0005543227 puppet-user[65106]: Warning: Scope(Class[Keystone]): The database_connection parameter is deprecated and will be \ Dec 3 09:09:00 np0005543227 puppet-user[65106]: removed in a future realse. Use keystone::db::database_connection instead Dec 3 09:09:00 np0005543227 podman[65744]: 2025-12-03 09:09:00.812417255 +0000 UTC m=+0.125105684 container cleanup 4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45 (image=registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1, name=container-puppet-horizon, batch=17.1_20251118.1, io.buildah.version=1.41.4, build-date=2025-11-18T23:41:37Z, io.k8s.description=Red Hat OpenStack Platform 17.1 horizon, architecture=x86_64, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-horizon, summary=Red Hat OpenStack Platform 17.1 horizon, url=https://www.redhat.com, release=1761123044, com.redhat.component=openstack-horizon-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.k8s.display-name=Red Hat OpenStack Platform 17.1 horizon, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, version=17.1.12, container_name=container-puppet-horizon, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, description=Red Hat OpenStack Platform 17.1 horizon, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-horizon) Dec 3 09:09:00 np0005543227 systemd[1]: libpod-conmon-4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45.scope: Deactivated successfully. Dec 3 09:09:00 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-horizon --conmon-pidfile /run/container-puppet-horizon.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,horizon_config --env NAME=horizon --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::horizon#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-horizon --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,horizon_config', 'NAME': 'horizon', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::horizon\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-horizon.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1 Dec 3 09:09:01 np0005543227 podman[65831]: 2025-12-03 09:09:01.035041249 +0000 UTC m=+0.106914933 container create bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, config_id=tripleo_puppet_step1, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, io.buildah.version=1.41.4, com.redhat.component=openstack-qdrouterd-container, vcs-type=git, release=1761123044, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, distribution-scope=public, container_name=container-puppet-metrics_qdr, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., name=rhosp17/openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, architecture=x86_64, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:46Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:01 np0005543227 podman[65831]: 2025-12-03 09:09:00.956917514 +0000 UTC m=+0.028791218 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:01 np0005543227 systemd[1]: Started libpod-conmon-bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863.scope. Dec 3 09:09:01 np0005543227 systemd[1]: var-lib-containers-storage-overlay-333230b13388b9b0a861bb079cfaa14ad49b911b40bf9a9866a96f71133c0151-merged.mount: Deactivated successfully. Dec 3 09:09:01 np0005543227 systemd[1]: var-lib-containers-storage-overlay-7e82bc90c347aa93514617f85dd4bcb41ce6218217fed49f4fec30701456b8af-merged.mount: Deactivated successfully. Dec 3 09:09:01 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-4f9301a36a0d4a4c7d256d4d6a2dcfcfae23de1ca6fcce488af50bce07befc45-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:01 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:01 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/19db77212c7d136a24ca495b06b5a13fb05750c2d396bfb714b6ad9ab98a842e/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:01 np0005543227 podman[65831]: 2025-12-03 09:09:01.091210269 +0000 UTC m=+0.163083953 container init bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, managed_by=tripleo_ansible, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, container_name=container-puppet-metrics_qdr, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, url=https://www.redhat.com, com.redhat.component=openstack-qdrouterd-container, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:46Z, batch=17.1_20251118.1, name=rhosp17/openstack-qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, version=17.1.12) Dec 3 09:09:01 np0005543227 podman[65831]: 2025-12-03 09:09:01.101558716 +0000 UTC m=+0.173432400 container start bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, name=rhosp17/openstack-qdrouterd, tcib_managed=true, distribution-scope=public, architecture=x86_64, managed_by=tripleo_ansible, url=https://www.redhat.com, batch=17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-qdrouterd-container, container_name=container-puppet-metrics_qdr, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:49:46Z, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, io.buildah.version=1.41.4) Dec 3 09:09:01 np0005543227 podman[65831]: 2025-12-03 09:09:01.101853325 +0000 UTC m=+0.173727039 container attach bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.4, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:49:46Z, managed_by=tripleo_ansible, vendor=Red Hat, Inc., container_name=container-puppet-metrics_qdr, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1, version=17.1.12, distribution-scope=public, url=https://www.redhat.com, io.openshift.expose-services=, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, com.redhat.component=openstack-qdrouterd-container, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-qdrouterd) Dec 3 09:09:01 np0005543227 systemd[1]: libpod-c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d.scope: Deactivated successfully. Dec 3 09:09:01 np0005543227 systemd[1]: libpod-c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d.scope: Consumed 4.152s CPU time. Dec 3 09:09:01 np0005543227 podman[64764]: 2025-12-03 09:09:01.233766608 +0000 UTC m=+4.532199199 container died c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-heat-api-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, vendor=Red Hat, Inc., build-date=2025-11-19T00:11:00Z, release=1761123044, version=17.1.12, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, managed_by=tripleo_ansible, container_name=container-puppet-heat, summary=Red Hat OpenStack Platform 17.1 heat-api, url=https://www.redhat.com, name=rhosp17/openstack-heat-api, tcib_managed=true, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 heat-api, batch=17.1_20251118.1, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, io.buildah.version=1.41.4) Dec 3 09:09:01 np0005543227 podman[65946]: 2025-12-03 09:09:01.288969007 +0000 UTC m=+0.052989213 container cleanup c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d (image=registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1, name=container-puppet-heat, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 heat-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 heat-api, vendor=Red Hat, Inc., architecture=x86_64, io.openshift.expose-services=, com.redhat.component=openstack-heat-api-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:11:00Z, batch=17.1_20251118.1, url=https://www.redhat.com, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, config_id=tripleo_puppet_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-heat-api, io.k8s.description=Red Hat OpenStack Platform 17.1 heat-api, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-heat, name=rhosp17/openstack-heat-api, managed_by=tripleo_ansible, tcib_managed=true, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 heat-api, vcs-ref=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd, distribution-scope=public, release=1761123044, org.opencontainers.image.revision=dc5d3d77496bd4a9b740ec6ffd4e8f5f84c519fd) Dec 3 09:09:01 np0005543227 systemd[1]: libpod-conmon-c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d.scope: Deactivated successfully. Dec 3 09:09:01 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-heat --conmon-pidfile /run/container-puppet-heat.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,heat_config,file,concat,file_line --env NAME=heat --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::heat::engine#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-heat --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,heat_config,file,concat,file_line', 'NAME': 'heat', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::heat::engine\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-heat.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-heat-api:17.1 Dec 3 09:09:01 np0005543227 puppet-user[65496]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:01 np0005543227 puppet-user[65496]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:01 np0005543227 puppet-user[65496]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:01 np0005543227 puppet-user[65496]: (file & line not available) Dec 3 09:09:01 np0005543227 puppet-user[65496]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:01 np0005543227 puppet-user[65496]: (file & line not available) Dec 3 09:09:01 np0005543227 podman[65924]: 2025-12-03 09:09:01.383130456 +0000 UTC m=+0.181050136 container create 7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-mysql, release=1761123044, name=rhosp17/openstack-mariadb, io.openshift.expose-services=, url=https://www.redhat.com, com.redhat.component=openstack-mariadb-container, architecture=x86_64, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, batch=17.1_20251118.1, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:01 np0005543227 systemd[1]: Started libpod-conmon-7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e.scope. Dec 3 09:09:01 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:01 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/51bf1de1ab01eeefee261f10e47037c29e232ed417809b55fe7a2949709e1593/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:01 np0005543227 podman[65924]: 2025-12-03 09:09:01.343251238 +0000 UTC m=+0.141171008 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:09:01 np0005543227 podman[65924]: 2025-12-03 09:09:01.44337615 +0000 UTC m=+0.241295820 container init 7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, com.redhat.component=openstack-mariadb-container, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.expose-services=, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, vendor=Red Hat, Inc., batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, tcib_managed=true, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=container-puppet-mysql, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:01 np0005543227 podman[65924]: 2025-12-03 09:09:01.448133017 +0000 UTC m=+0.246052697 container start 7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, com.redhat.component=openstack-mariadb-container, container_name=container-puppet-mysql, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, url=https://www.redhat.com, build-date=2025-11-18T22:51:13Z, vendor=Red Hat, Inc., architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, managed_by=tripleo_ansible, batch=17.1_20251118.1, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team) Dec 3 09:09:01 np0005543227 podman[65924]: 2025-12-03 09:09:01.448286862 +0000 UTC m=+0.246206522 container attach 7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-mariadb-container, distribution-scope=public, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, url=https://www.redhat.com, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, tcib_managed=true, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, container_name=container-puppet-mysql, vendor=Red Hat, Inc., name=rhosp17/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, build-date=2025-11-18T22:51:13Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Dec 3 09:09:01 np0005543227 puppet-user[65496]: Warning: Scope(Class[Manila]): The sql_connection parameter is deprecated and will be \ Dec 3 09:09:01 np0005543227 puppet-user[65496]: removed in a future realse. Use manila::db::database_connection instead Dec 3 09:09:01 np0005543227 puppet-user[65106]: Warning: Scope(Apache::Vhost[keystone_wsgi]): Dec 3 09:09:01 np0005543227 puppet-user[65106]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:01 np0005543227 puppet-user[65106]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:01 np0005543227 puppet-user[65106]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:01 np0005543227 puppet-user[65106]: file names. Dec 3 09:09:01 np0005543227 puppet-user[65106]: Dec 3 09:09:01 np0005543227 puppet-user[65106]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:01 np0005543227 puppet-user[65106]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:01 np0005543227 puppet-user[65106]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:01 np0005543227 puppet-user[65106]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.24 seconds Dec 3 09:09:01 np0005543227 podman[66088]: 2025-12-03 09:09:01.660213227 +0000 UTC m=+0.076434874 container create a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, name=rhosp17/openstack-neutron-server, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 neutron-server, release=1761123044, tcib_managed=true, vendor=Red Hat, Inc., batch=17.1_20251118.1, managed_by=tripleo_ansible, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, architecture=x86_64, build-date=2025-11-19T00:23:27Z, vcs-type=git, com.redhat.component=openstack-neutron-server-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, container_name=container-puppet-neutron, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 neutron-server) Dec 3 09:09:01 np0005543227 systemd[1]: Started libpod-conmon-a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f.scope. Dec 3 09:09:01 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:01 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/3b44830e308e77d1703b3978241ad14aab26256ae212206672bbef2d05adf2f0/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:01 np0005543227 podman[66088]: 2025-12-03 09:09:01.702986064 +0000 UTC m=+0.119207711 container init a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, container_name=container-puppet-neutron, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, vendor=Red Hat, Inc., distribution-scope=public, name=rhosp17/openstack-neutron-server, config_id=tripleo_puppet_step1, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.buildah.version=1.41.4, build-date=2025-11-19T00:23:27Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-neutron-server-container, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 neutron-server, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.12, vcs-type=git, batch=17.1_20251118.1) Dec 3 09:09:01 np0005543227 podman[66088]: 2025-12-03 09:09:01.708929927 +0000 UTC m=+0.125151574 container start a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, vendor=Red Hat, Inc., distribution-scope=public, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, description=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20251118.1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, architecture=x86_64, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, build-date=2025-11-19T00:23:27Z, summary=Red Hat OpenStack Platform 17.1 neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-neutron-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, com.redhat.component=openstack-neutron-server-container, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, container_name=container-puppet-neutron, version=17.1.12, maintainer=OpenStack TripleO Team, release=1761123044) Dec 3 09:09:01 np0005543227 podman[66088]: 2025-12-03 09:09:01.709128093 +0000 UTC m=+0.125349770 container attach a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 neutron-server, release=1761123044, tcib_managed=true, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container, container_name=container-puppet-neutron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-neutron-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, architecture=x86_64, io.buildah.version=1.41.4, build-date=2025-11-19T00:23:27Z, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, config_id=tripleo_puppet_step1, url=https://www.redhat.com) Dec 3 09:09:01 np0005543227 podman[66088]: 2025-12-03 09:09:01.617639596 +0000 UTC m=+0.033861273 image pull registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:01 np0005543227 puppet-user[65583]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:01 np0005543227 puppet-user[65583]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:01 np0005543227 puppet-user[65583]: (file & line not available) Dec 3 09:09:01 np0005543227 puppet-user[65583]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:01 np0005543227 puppet-user[65583]: (file & line not available) Dec 3 09:09:01 np0005543227 puppet-user[65583]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.08 seconds Dec 3 09:09:01 np0005543227 puppet-user[65583]: Notice: /Stage[main]/Memcached/File[/etc/sysconfig/memcached]/content: content changed '{sha256}31f7d20fad86bdd2bc5692619928af8785dc0e9f858863aeece67cff0e4edfd2' to '{sha256}4997424c856782ebd2e73d4d63ee2d4fc83e97cecd24b356dd217fc580b2788d' Dec 3 09:09:01 np0005543227 puppet-user[65583]: Notice: Applied catalog in 0.02 seconds Dec 3 09:09:01 np0005543227 puppet-user[65583]: Application: Dec 3 09:09:01 np0005543227 puppet-user[65583]: Initial environment: production Dec 3 09:09:01 np0005543227 puppet-user[65583]: Converged environment: production Dec 3 09:09:01 np0005543227 puppet-user[65583]: Run mode: user Dec 3 09:09:01 np0005543227 puppet-user[65583]: Changes: Dec 3 09:09:01 np0005543227 puppet-user[65583]: Total: 1 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Events: Dec 3 09:09:01 np0005543227 puppet-user[65583]: Success: 1 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Total: 1 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Resources: Dec 3 09:09:01 np0005543227 puppet-user[65583]: Changed: 1 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Out of sync: 1 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Skipped: 9 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Total: 10 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Time: Dec 3 09:09:01 np0005543227 puppet-user[65583]: File: 0.01 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Transaction evaluation: 0.01 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Catalog application: 0.02 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Config retrieval: 0.12 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Last run: 1764752941 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Total: 0.02 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Version: Dec 3 09:09:01 np0005543227 puppet-user[65583]: Config: 1764752941 Dec 3 09:09:01 np0005543227 puppet-user[65583]: Puppet: 7.10.0 Dec 3 09:09:01 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[token/expiration]/ensure: created Dec 3 09:09:01 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/enable]/ensure: created Dec 3 09:09:01 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/certfile]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/keyfile]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_certs]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/ca_key]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[ssl/cert_subject]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/driver]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[catalog/template_file]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[token/provider]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[DEFAULT/notification_format]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/0]/ensure: defined content as '{sha256}d1c4eb8d9040e59a19e330d34169ac628cb0ee934df4ba79279dbfd52693599d' Dec 3 09:09:02 np0005543227 systemd[1]: var-lib-containers-storage-overlay-036f2cb732399217bf2ef9a4f6fd3cf875a0828997c8729cef7bd92f2ce2368c-merged.mount: Deactivated successfully. Dec 3 09:09:02 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-c7752a9e405b510b4b2b93db71535d6a701be8431f406d93fded4c658d82a81d-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/File[/etc/keystone/fernet-keys/1]/ensure: defined content as '{sha256}4a50a997f4057a50b53effbb692e9fd341a299a275a2a6a57678669bba4b3297' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/0]/ensure: defined content as '{sha256}3c93411564ad8d5d76bfa8c1edbc8d75fefded34037ac674de49370afba1cd51' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/File[/etc/keystone/credential-keys/1]/ensure: defined content as '{sha256}c31f5846df6ac935ec9e7bcb47caf259fe4e469f542c5810edad79b5f0d21399' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/key_repository]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[token/revoke_by_id]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[fernet_tokens/max_active_keys]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Keystone_config[credential/key_repository]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:02 np0005543227 systemd[1]: libpod-2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6.scope: Deactivated successfully. Dec 3 09:09:02 np0005543227 systemd[1]: libpod-2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6.scope: Consumed 2.079s CPU time. Dec 3 09:09:02 np0005543227 podman[65547]: 2025-12-03 09:09:02.157563929 +0000 UTC m=+2.389494829 container died 2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, url=https://www.redhat.com, tcib_managed=true, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-memcached, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-memcached-container, name=rhosp17/openstack-memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, batch=17.1_20251118.1, io.buildah.version=1.41.4, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 memcached, release=1761123044, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 memcached, build-date=2025-11-18T22:49:49Z, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Cron::Trust_flush/Cron[keystone-manage trust_flush]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend]/ensure: created Dec 3 09:09:02 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:02 np0005543227 systemd[1]: var-lib-containers-storage-overlay-4bced37bd0351a96af93d1a4311e341e9fc28f97419f49b53f31dd8076e661ed-merged.mount: Deactivated successfully. Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/backend_argument]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/enabled]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/memcache_servers]/ensure: created Dec 3 09:09:02 np0005543227 podman[66207]: 2025-12-03 09:09:02.263755539 +0000 UTC m=+0.096921505 container cleanup 2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=container-puppet-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=container-puppet-memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:49:49Z, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, com.redhat.component=openstack-memcached-container, batch=17.1_20251118.1, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, name=rhosp17/openstack-memcached, architecture=x86_64, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, url=https://www.redhat.com, version=17.1.12, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:02 np0005543227 systemd[1]: libpod-conmon-2bbd2c113639a70a6b8b59276282a339f15cf1a1f3542be76549dfe69a2d1de6.scope: Deactivated successfully. Dec 3 09:09:02 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-memcached --conmon-pidfile /run/container-puppet-memcached.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=memcached --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::memcached#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-memcached --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'memcached', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::memcached\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-memcached.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Cache/Oslo::Cache[keystone_config]/Keystone_config[cache/tls_enabled]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/debug]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Logging/Oslo::Log[keystone_config]/Keystone_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Unknown variable: 'ensure'. (file: /etc/puppet/modules/manila/manifests/share.pp, line: 50, column: 18) Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Unknown variable: 'manila_generic_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 292, column: 48) Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Unknown variable: 'manila_netapp_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 294, column: 39) Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Unknown variable: 'manila_vmax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 295, column: 39) Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Unknown variable: 'manila_powermax_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 296, column: 39) Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Unknown variable: 'manila_isilon_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 297, column: 39) Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Unknown variable: 'manila_unity_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 298, column: 39) Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Unknown variable: 'manila_vnx_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 299, column: 39) Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Unknown variable: 'manila_flashblade_backend'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/manila/share.pp, line: 300, column: 39) Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Policy/Oslo::Policy[keystone_config]/Keystone_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/connection]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/max_retries]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Db/Oslo::Db[keystone_config]/Keystone_config[database/db_max_retries]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Oslo::Middleware[keystone_config]/Keystone_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Default[keystone_config]/Keystone_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Notifications[keystone_config]/Keystone_config[oslo_messaging_notifications/topics]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone/Oslo::Messaging::Rabbit[keystone_config]/Keystone_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:02 np0005543227 podman[66279]: 2025-12-03 09:09:02.631357006 +0000 UTC m=+0.079648263 container create e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, tcib_managed=true, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, release=1761123044, container_name=container-puppet-nova, maintainer=OpenStack TripleO Team, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, architecture=x86_64, build-date=2025-11-19T00:34:57Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, name=rhosp17/openstack-nova-api, vendor=Red Hat, Inc., vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12) Dec 3 09:09:02 np0005543227 systemd[1]: Started libpod-conmon-e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16.scope. Dec 3 09:09:02 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:02 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7fb17cae19e2b84594ef1bfa9de0de14c1e31ea73cfaef5b1f60d19a308832c0/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:02 np0005543227 podman[66279]: 2025-12-03 09:09:02.592363626 +0000 UTC m=+0.040654863 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 09:09:02 np0005543227 podman[66279]: 2025-12-03 09:09:02.694259263 +0000 UTC m=+0.142550480 container init e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, com.redhat.component=openstack-nova-api-container, container_name=container-puppet-nova, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, config_id=tripleo_puppet_step1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.buildah.version=1.41.4, io.openshift.expose-services=, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-19T00:34:57Z, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., name=rhosp17/openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, managed_by=tripleo_ansible, version=17.1.12) Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}53dfa0d41d027ee4ada678fc8cff712d592eb56677fe52adaa1f3a2e42fd9f60' Dec 3 09:09:02 np0005543227 puppet-user[65496]: Warning: Scope(Apache::Vhost[manila_wsgi]): Dec 3 09:09:02 np0005543227 puppet-user[65496]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:02 np0005543227 puppet-user[65496]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:02 np0005543227 puppet-user[65496]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:02 np0005543227 puppet-user[65496]: file names. Dec 3 09:09:02 np0005543227 puppet-user[65496]: Dec 3 09:09:02 np0005543227 puppet-user[65496]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:02 np0005543227 puppet-user[65496]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:02 np0005543227 puppet-user[65496]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:09:02 np0005543227 podman[66279]: 2025-12-03 09:09:02.701867058 +0000 UTC m=+0.150158285 container start e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, version=17.1.12, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, container_name=container-puppet-nova, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, build-date=2025-11-19T00:34:57Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.expose-services=, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, release=1761123044, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, distribution-scope=public, vcs-type=git, name=rhosp17/openstack-nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, url=https://www.redhat.com, com.redhat.component=openstack-nova-api-container, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4) Dec 3 09:09:02 np0005543227 podman[66279]: 2025-12-03 09:09:02.702138706 +0000 UTC m=+0.150429963 container attach e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, tcib_managed=true, release=1761123044, build-date=2025-11-19T00:34:57Z, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-nova, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, vendor=Red Hat, Inc., com.redhat.component=openstack-nova-api-container, vcs-type=git, io.openshift.expose-services=, version=17.1.12, name=rhosp17/openstack-nova-api, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, url=https://www.redhat.com, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api) Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[/var/www/cgi-bin/keystone]/group: group changed 'root' to 'keystone' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/File[keystone_wsgi]/ensure: defined content as '{sha256}55e95baab868583f1b6646e2dcc61edb7f403991f97d4397478e9a9dd3e7d1f2' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_mellon.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/auth_openidc.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:02 np0005543227 puppet-user[65496]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.50 seconds Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_gssapi.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_mellon.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-auth_openidc.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: /Stage[main]/Keystone::Wsgi::Apache/Openstacklib::Wsgi::Apache[keystone_wsgi]/Apache::Vhost[keystone_wsgi]/Concat[10-keystone_wsgi.conf]/File[/etc/httpd/conf.d/10-keystone_wsgi.conf]/ensure: defined content as '{sha256}4835f1496b6a549a3d88902fad0c29f63d3627122f2efa73376266cc10a561d1' Dec 3 09:09:02 np0005543227 puppet-user[65106]: Notice: Applied catalog in 1.10 seconds Dec 3 09:09:02 np0005543227 puppet-user[65106]: Application: Dec 3 09:09:02 np0005543227 puppet-user[65106]: Initial environment: production Dec 3 09:09:02 np0005543227 puppet-user[65106]: Converged environment: production Dec 3 09:09:02 np0005543227 puppet-user[65106]: Run mode: user Dec 3 09:09:02 np0005543227 puppet-user[65106]: Changes: Dec 3 09:09:02 np0005543227 puppet-user[65106]: Total: 88 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Events: Dec 3 09:09:02 np0005543227 puppet-user[65106]: Success: 88 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Total: 88 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Resources: Dec 3 09:09:02 np0005543227 puppet-user[65106]: Skipped: 31 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Changed: 88 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Out of sync: 88 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Total: 279 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Time: Dec 3 09:09:02 np0005543227 puppet-user[65106]: Concat file: 0.00 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Concat fragment: 0.00 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Cron: 0.01 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Augeas: 0.02 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Package: 0.02 Dec 3 09:09:02 np0005543227 puppet-user[65106]: File: 0.15 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Keystone config: 0.66 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Transaction evaluation: 1.09 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Catalog application: 1.10 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Config retrieval: 1.43 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Last run: 1764752942 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Resources: 0.00 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Total: 1.10 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Version: Dec 3 09:09:02 np0005543227 puppet-user[65106]: Config: 1764752940 Dec 3 09:09:02 np0005543227 puppet-user[65106]: Puppet: 7.10.0 Dec 3 09:09:02 np0005543227 puppet-user[65921]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:02 np0005543227 puppet-user[65921]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:02 np0005543227 puppet-user[65921]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:02 np0005543227 puppet-user[65921]: (file & line not available) Dec 3 09:09:02 np0005543227 puppet-user[65921]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:02 np0005543227 puppet-user[65921]: (file & line not available) Dec 3 09:09:02 np0005543227 puppet-user[65921]: Notice: Accepting previously invalid value for target type 'Integer' Dec 3 09:09:03 np0005543227 puppet-user[65921]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.11 seconds Dec 3 09:09:03 np0005543227 puppet-user[65921]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/owner: owner changed 'qdrouterd' to 'root' Dec 3 09:09:03 np0005543227 puppet-user[65921]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/group: group changed 'qdrouterd' to 'root' Dec 3 09:09:03 np0005543227 puppet-user[65921]: Notice: /Stage[main]/Qdr::Config/File[/var/lib/qdrouterd]/mode: mode changed '0700' to '0755' Dec 3 09:09:03 np0005543227 puppet-user[65921]: Notice: /Stage[main]/Qdr::Config/File[/etc/qpid-dispatch/ssl]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65921]: Notice: /Stage[main]/Qdr::Config/File[qdrouterd.conf]/content: content changed '{sha256}89e10d8896247f992c5f0baf027c25a8ca5d0441be46d8859d9db2067ea74cd3' to '{sha256}b15a28a7b61f42e552c7b827ca52329f5ef44104b727fcadd0eb3409ac81dd78' Dec 3 09:09:03 np0005543227 puppet-user[65921]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65921]: Notice: /Stage[main]/Qdr::Config/File[/var/log/qdrouterd/metrics_qdr.log]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65921]: Notice: Applied catalog in 0.04 seconds Dec 3 09:09:03 np0005543227 puppet-user[65921]: Application: Dec 3 09:09:03 np0005543227 puppet-user[65921]: Initial environment: production Dec 3 09:09:03 np0005543227 puppet-user[65921]: Converged environment: production Dec 3 09:09:03 np0005543227 puppet-user[65921]: Run mode: user Dec 3 09:09:03 np0005543227 puppet-user[65921]: Changes: Dec 3 09:09:03 np0005543227 puppet-user[65921]: Total: 7 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Events: Dec 3 09:09:03 np0005543227 puppet-user[65921]: Success: 7 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Total: 7 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Resources: Dec 3 09:09:03 np0005543227 puppet-user[65921]: Skipped: 13 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Changed: 5 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Out of sync: 5 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Total: 20 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Time: Dec 3 09:09:03 np0005543227 puppet-user[65921]: File: 0.01 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Transaction evaluation: 0.03 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Catalog application: 0.04 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Config retrieval: 0.14 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Last run: 1764752943 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Total: 0.04 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Version: Dec 3 09:09:03 np0005543227 puppet-user[65921]: Config: 1764752942 Dec 3 09:09:03 np0005543227 puppet-user[65921]: Puppet: 7.10.0 Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/api_paste_config]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/storage_availability_zone]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/rootwrap_config]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/state_path]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Manila_config[DEFAULT/host]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_listen]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/enabled_share_protocols]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/default_share_type]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/osapi_share_workers]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Api/Manila_config[DEFAULT/auth_strategy]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Cron::Db_purge/Cron[manila-manage db purge]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[66171]: Error: Facter: error while resolving custom fact "haproxy_version": undefined method `strip' for nil:NilClass Dec 3 09:09:03 np0005543227 ovs-vsctl[66445]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_url]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/auth_type]/ensure: created Dec 3 09:09:03 np0005543227 systemd[1]: libpod-bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863.scope: Deactivated successfully. Dec 3 09:09:03 np0005543227 systemd[1]: libpod-bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863.scope: Consumed 2.099s CPU time. Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/region_name]/ensure: created Dec 3 09:09:03 np0005543227 podman[65831]: 2025-12-03 09:09:03.368304236 +0000 UTC m=+2.440177920 container died bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, vcs-type=git, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, build-date=2025-11-18T22:49:46Z, tcib_managed=true, io.buildah.version=1.41.4, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-qdrouterd-container, container_name=container-puppet-metrics_qdr, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, version=17.1.12, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044) Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/username]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/user_domain_name]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/password]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_name]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Compute::Nova/Manila_config[nova/project_domain_name]/ensure: created Dec 3 09:09:03 np0005543227 systemd[1]: tmp-crun.PmYeWK.mount: Deactivated successfully. Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_api_class]/ensure: created Dec 3 09:09:03 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_url]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/auth_type]/ensure: created Dec 3 09:09:03 np0005543227 systemd[1]: libpod-de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb.scope: Deactivated successfully. Dec 3 09:09:03 np0005543227 systemd[1]: libpod-de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb.scope: Consumed 4.817s CPU time. Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/region_name]/ensure: created Dec 3 09:09:03 np0005543227 podman[66461]: 2025-12-03 09:09:03.463170826 +0000 UTC m=+0.089294479 container cleanup bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=container-puppet-metrics_qdr, config_id=tripleo_puppet_step1, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:46Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, io.buildah.version=1.41.4, version=17.1.12, description=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vendor=Red Hat, Inc., architecture=x86_64, distribution-scope=public, tcib_managed=true, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, name=rhosp17/openstack-qdrouterd, io.openshift.expose-services=, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=container-puppet-metrics_qdr) Dec 3 09:09:03 np0005543227 systemd[1]: libpod-conmon-bcd0d1322c03acf6209819e2dc9f24fa9045c9b788d41f518672fa3a0624e863.scope: Deactivated successfully. Dec 3 09:09:03 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-metrics_qdr --conmon-pidfile /run/container-puppet-metrics_qdr.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=metrics_qdr --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::metrics::qdr#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-metrics_qdr --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'metrics_qdr', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::metrics::qdr\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-metrics_qdr.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/username]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/user_domain_name]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/password]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[66171]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:03 np0005543227 puppet-user[66171]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:03 np0005543227 puppet-user[66171]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:03 np0005543227 puppet-user[66171]: (file & line not available) Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_name]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[neutron/project_domain_name]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv4_enabled]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[66171]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:03 np0005543227 puppet-user[66171]: (file & line not available) Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Network::Neutron/Manila_config[DEFAULT/network_plugin_ipv6_enabled]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[66171]: Warning: Unknown variable: 'dhcp_agents_per_net'. (file: /etc/puppet/modules/tripleo/manifests/profile/base/neutron.pp, line: 154, column: 37) Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Backends/Manila_config[DEFAULT/enabled_share_backends]/ensure: created Dec 3 09:09:03 np0005543227 podman[65073]: 2025-12-03 09:09:03.564662442 +0000 UTC m=+5.423743648 container died de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, io.openshift.expose-services=, vendor=Red Hat, Inc., name=rhosp17/openstack-keystone, description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, managed_by=tripleo_ansible, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-keystone-container, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, batch=17.1_20251118.1, distribution-scope=public, build-date=2025-11-18T23:45:30Z, config_id=tripleo_puppet_step1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, summary=Red Hat OpenStack Platform 17.1 keystone, maintainer=OpenStack TripleO Team, container_name=container-puppet-keystone, architecture=x86_64, version=17.1.12, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone) Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/connection]/ensure: created Dec 3 09:09:03 np0005543227 podman[66540]: 2025-12-03 09:09:03.600447453 +0000 UTC m=+0.132032946 container cleanup de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb (image=registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1, name=container-puppet-keystone, description=Red Hat OpenStack Platform 17.1 keystone, io.buildah.version=1.41.4, container_name=container-puppet-keystone, name=rhosp17/openstack-keystone, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, com.redhat.component=openstack-keystone-container, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, distribution-scope=public, config_id=tripleo_puppet_step1, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T23:45:30Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 keystone, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 keystone, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-type=git, io.openshift.expose-services=, version=17.1.12, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 keystone, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-keystone, batch=17.1_20251118.1, url=https://www.redhat.com) Dec 3 09:09:03 np0005543227 systemd[1]: libpod-conmon-de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb.scope: Deactivated successfully. Dec 3 09:09:03 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-keystone --conmon-pidfile /run/container-puppet-keystone.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config --env NAME=keystone --env STEP_CONFIG=include ::tripleo::packages#012['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::keystone#012#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-keystone --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,keystone_config,keystone_domain_config', 'NAME': 'keystone', 'STEP_CONFIG': "include ::tripleo::packages\n['Keystone_user', 'Keystone_endpoint', 'Keystone_domain', 'Keystone_tenant', 'Keystone_user_role', 'Keystone_role', 'Keystone_service'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::keystone\n\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-keystone.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1 Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/max_retries]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Db/Oslo::Db[manila_config]/Manila_config[database/db_max_retries]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Rabbit[manila_config]/Manila_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[66066]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:03 np0005543227 puppet-user[66066]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:03 np0005543227 puppet-user[66066]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:03 np0005543227 puppet-user[66066]: (file & line not available) Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/server_request_prefix]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/broadcast_prefix]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/group_request_prefix]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/container_name]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/idle_timeout]/ensure: created Dec 3 09:09:03 np0005543227 podman[66697]: 2025-12-03 09:09:03.919064103 +0000 UTC m=+0.071761470 container create fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=container-puppet-nova_metadata, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, tcib_managed=true, vendor=Red Hat, Inc., version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.openshift.expose-services=, distribution-scope=public, name=rhosp17/openstack-nova-api, batch=17.1_20251118.1, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:34:57Z, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, release=1761123044, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Amqp[manila_config]/Manila_config[oslo_messaging_amqp/trace]/ensure: created Dec 3 09:09:03 np0005543227 puppet-user[66066]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:03 np0005543227 puppet-user[66066]: (file & line not available) Dec 3 09:09:03 np0005543227 systemd[1]: Started libpod-conmon-fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b.scope. Dec 3 09:09:03 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:03 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0e2016414c93ca8e306aaaac5ac7ac8fa08c9573c80346e069951f1f15984390/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:03 np0005543227 podman[66697]: 2025-12-03 09:09:03.876538623 +0000 UTC m=+0.029236030 image pull registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 09:09:03 np0005543227 podman[66697]: 2025-12-03 09:09:03.978494432 +0000 UTC m=+0.131191789 container init fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-nova_metadata, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, version=17.1.12, vendor=Red Hat, Inc., release=1761123044, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, distribution-scope=public, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.component=openstack-nova-api-container, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, config_id=tripleo_puppet_step1, architecture=x86_64, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, build-date=2025-11-19T00:34:57Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:09:03 np0005543227 podman[66697]: 2025-12-03 09:09:03.988872422 +0000 UTC m=+0.141569779 container start fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, vendor=Red Hat, Inc., version=17.1.12, distribution-scope=public, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, io.openshift.expose-services=, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 nova-api, container_name=container-puppet-nova_metadata, release=1761123044, name=rhosp17/openstack-nova-api, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-nova-api-container, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, managed_by=tripleo_ansible, build-date=2025-11-19T00:34:57Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Dec 3 09:09:03 np0005543227 podman[66697]: 2025-12-03 09:09:03.989057807 +0000 UTC m=+0.141755164 container attach fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-nova-api-container, io.openshift.expose-services=, build-date=2025-11-19T00:34:57Z, summary=Red Hat OpenStack Platform 17.1 nova-api, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, managed_by=tripleo_ansible, vcs-type=git, maintainer=OpenStack TripleO Team, architecture=x86_64, url=https://www.redhat.com, name=rhosp17/openstack-nova-api, release=1761123044, batch=17.1_20251118.1, tcib_managed=true, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-nova_metadata, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, version=17.1.12, distribution-scope=public, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d) Dec 3 09:09:03 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Default[manila_config]/Manila_config[DEFAULT/control_exchange]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Messaging::Notifications[manila_config]/Manila_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila/Oslo::Concurrency[manila_config]/Manila_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:09:04 np0005543227 podman[66735]: 2025-12-03 09:09:04.042164883 +0000 UTC m=+0.071023418 container create 8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:32Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, summary=Red Hat OpenStack Platform 17.1 cron, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-cron-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-crond, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, name=rhosp17/openstack-cron, batch=17.1_20251118.1, distribution-scope=public, release=1761123044, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 cron, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 cron) Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/debug]/ensure: created Dec 3 09:09:04 np0005543227 systemd[1]: Started libpod-conmon-8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f.scope. Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Logging/Oslo::Log[manila_config]/Manila_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:04 np0005543227 systemd[1]: var-lib-containers-storage-overlay-19db77212c7d136a24ca495b06b5a13fb05750c2d396bfb714b6ad9ab98a842e-merged.mount: Deactivated successfully. Dec 3 09:09:04 np0005543227 systemd[1]: var-lib-containers-storage-overlay-6a17edec0cd646ee0676d57e76028f3f29f2cee41671ba54ef111d93c44b49d4-merged.mount: Deactivated successfully. Dec 3 09:09:04 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-de5add2da87f5a6fcfd0f1d0bc0280d0dff28c540ba35963c24b6b6dfd808ebb-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:04 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:04 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/a362315ad58d45f769cf3853f121ef0b3db8686af96944994e316a3bd0cac8dd/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:04 np0005543227 podman[66735]: 2025-12-03 09:09:04.097717413 +0000 UTC m=+0.126575948 container init 8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, com.redhat.component=openstack-cron-container, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, description=Red Hat OpenStack Platform 17.1 cron, container_name=container-puppet-crond, version=17.1.12, config_id=tripleo_puppet_step1, name=rhosp17/openstack-cron, batch=17.1_20251118.1, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, release=1761123044, io.openshift.expose-services=, build-date=2025-11-18T22:49:32Z, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 cron, maintainer=OpenStack TripleO Team, architecture=x86_64, tcib_managed=true) Dec 3 09:09:04 np0005543227 podman[66735]: 2025-12-03 09:09:04.008679652 +0000 UTC m=+0.037538227 image pull registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Dec 3 09:09:04 np0005543227 podman[66735]: 2025-12-03 09:09:04.112729095 +0000 UTC m=+0.141587640 container start 8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, managed_by=tripleo_ansible, io.buildah.version=1.41.4, tcib_managed=true, maintainer=OpenStack TripleO Team, container_name=container-puppet-crond, version=17.1.12, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 cron, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, build-date=2025-11-18T22:49:32Z, architecture=x86_64, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-cron-container, io.openshift.expose-services=, config_id=tripleo_puppet_step1, name=rhosp17/openstack-cron, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron) Dec 3 09:09:04 np0005543227 podman[66735]: 2025-12-03 09:09:04.112972162 +0000 UTC m=+0.141830737 container attach 8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:32Z, architecture=x86_64, tcib_managed=true, com.redhat.component=openstack-cron-container, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, config_id=tripleo_puppet_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, distribution-scope=public, managed_by=tripleo_ansible, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, name=rhosp17/openstack-cron, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, batch=17.1_20251118.1, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 cron, url=https://www.redhat.com, container_name=container-puppet-crond) Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[66066]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.40 seconds Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[66066]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/root/.my.cnf]/ensure: defined content as '{sha256}98314b5eae4d44311bb4ba3cfaf593836a30c5495707471136aeccfb1e56efe1' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[66066]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Mysql_bundle/File[/etc/sysconfig/clustercheck]/ensure: defined content as '{sha256}ef3f593b0b46db53f6b97e2ab3b05a160a2ea23f0d31cb8f10d27a5cbd8f94c0' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[66066]: Notice: /Stage[main]/Mysql::Server::Config/File[mysql-config-file]/content: content changed '{sha256}df7b18b99470a82afb1aebff284d910b04ceb628c9ac89d8e2fe9fb4682d5fc9' to '{sha256}31fc4653f60f4fbd9619f1de999833a4ddb28cfe5cef2c981b64ae0c1d907c40' Dec 3 09:09:04 np0005543227 puppet-user[66066]: Notice: /Stage[main]/Mysql::Server::Installdb/File[/var/log/mariadb/mariadb.log]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[66066]: Notice: Applied catalog in 0.09 seconds Dec 3 09:09:04 np0005543227 puppet-user[66066]: Application: Dec 3 09:09:04 np0005543227 puppet-user[66066]: Initial environment: production Dec 3 09:09:04 np0005543227 puppet-user[66066]: Converged environment: production Dec 3 09:09:04 np0005543227 puppet-user[66066]: Run mode: user Dec 3 09:09:04 np0005543227 puppet-user[66066]: Changes: Dec 3 09:09:04 np0005543227 puppet-user[66066]: Total: 4 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Events: Dec 3 09:09:04 np0005543227 puppet-user[66066]: Success: 4 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Total: 4 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Resources: Dec 3 09:09:04 np0005543227 puppet-user[66066]: Skipped: 13 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Changed: 4 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Out of sync: 4 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Total: 18 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Time: Dec 3 09:09:04 np0005543227 puppet-user[66066]: File: 0.02 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Transaction evaluation: 0.06 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Catalog application: 0.09 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Config retrieval: 0.45 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Last run: 1764752944 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Total: 0.09 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Version: Dec 3 09:09:04 np0005543227 puppet-user[66066]: Config: 1764752943 Dec 3 09:09:04 np0005543227 puppet-user[66066]: Puppet: 7.10.0 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Keystone::Authtoken/Keystone::Resource::Authtoken[manila_config]/Manila_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}42b2b3e1254096a3c28e781e5fcac0be11fcca2a0d1dc1ddb2773c358318ea37' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:04 np0005543227 ovs-vsctl[66794]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Policy/Oslo::Policy[manila_config]/Manila_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Api/Oslo::Middleware[manila_config]/Manila_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[/var/www/cgi-bin/manila]/group: group changed 'root' to 'manila' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/File[manila_wsgi]/ensure: defined content as '{sha256}ca07199ace8325d094e754ccdfefb2b5a78a13cd657d68221b3a68b53b0dd893' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/driver_handles_share_servers]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_backend_name]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/share_driver]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_conf_path]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_auth_id]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[66315]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:04 np0005543227 puppet-user[66315]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_cluster_name]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[66315]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:04 np0005543227 puppet-user[66315]: (file & line not available) Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_ip]/ensure: created Dec 3 09:09:04 np0005543227 systemd[1]: libpod-7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e.scope: Deactivated successfully. Dec 3 09:09:04 np0005543227 systemd[1]: libpod-7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e.scope: Consumed 2.974s CPU time. Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_ganesha_server_is_remote]/ensure: created Dec 3 09:09:04 np0005543227 podman[65924]: 2025-12-03 09:09:04.63388381 +0000 UTC m=+3.431803550 container died 7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, managed_by=tripleo_ansible, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, container_name=container-puppet-mysql, io.buildah.version=1.41.4, release=1761123044, name=rhosp17/openstack-mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, vcs-type=git, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:51:13Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-mariadb-container, architecture=x86_64) Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_volume_mode]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Tripleo::Profile::Base::Manila::Share/Manila::Backend::Cephfs[cephfs]/Manila_config[cephfs/cephfs_protocol_helper_type]/ensure: created Dec 3 09:09:04 np0005543227 puppet-user[66315]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:04 np0005543227 puppet-user[66315]: (file & line not available) Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: /Stage[main]/Manila::Wsgi::Apache/Openstacklib::Wsgi::Apache[manila_wsgi]/Apache::Vhost[manila_wsgi]/Concat[10-manila_wsgi.conf]/File[/etc/httpd/conf.d/10-manila_wsgi.conf]/ensure: defined content as '{sha256}4804804b700d41219116b375d5f3b58078ca50f700bb8812b3f40892f15fb709' Dec 3 09:09:04 np0005543227 puppet-user[65496]: Notice: Applied catalog in 1.66 seconds Dec 3 09:09:04 np0005543227 puppet-user[65496]: Application: Dec 3 09:09:04 np0005543227 puppet-user[65496]: Initial environment: production Dec 3 09:09:04 np0005543227 puppet-user[65496]: Converged environment: production Dec 3 09:09:04 np0005543227 puppet-user[65496]: Run mode: user Dec 3 09:09:04 np0005543227 puppet-user[65496]: Changes: Dec 3 09:09:04 np0005543227 puppet-user[65496]: Total: 115 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Events: Dec 3 09:09:04 np0005543227 puppet-user[65496]: Success: 115 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Total: 115 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Resources: Dec 3 09:09:04 np0005543227 puppet-user[65496]: Changed: 115 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Out of sync: 115 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Skipped: 47 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Total: 330 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Time: Dec 3 09:09:04 np0005543227 puppet-user[65496]: Resources: 0.00 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Concat file: 0.00 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Concat fragment: 0.00 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Cron: 0.01 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Augeas: 0.02 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Package: 0.02 Dec 3 09:09:04 np0005543227 puppet-user[65496]: File: 0.13 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Manila config: 1.23 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Transaction evaluation: 1.65 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Catalog application: 1.66 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Config retrieval: 1.73 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Last run: 1764752944 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Total: 1.66 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Version: Dec 3 09:09:04 np0005543227 puppet-user[65496]: Config: 1764752941 Dec 3 09:09:04 np0005543227 puppet-user[65496]: Puppet: 7.10.0 Dec 3 09:09:04 np0005543227 podman[66881]: 2025-12-03 09:09:04.731079273 +0000 UTC m=+0.091044904 container cleanup 7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=container-puppet-mysql, url=https://www.redhat.com, tcib_managed=true, managed_by=tripleo_ansible, io.openshift.expose-services=, name=rhosp17/openstack-mariadb, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-mariadb-container, build-date=2025-11-18T22:51:13Z, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, release=1761123044, container_name=container-puppet-mysql, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Dec 3 09:09:04 np0005543227 systemd[1]: libpod-conmon-7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e.scope: Deactivated successfully. Dec 3 09:09:04 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-mysql --conmon-pidfile /run/container-puppet-mysql.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file --env NAME=mysql --env STEP_CONFIG=include ::tripleo::packages#012['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }#012exec {'wait-for-settle': command => '/bin/true' }#012include tripleo::profile::pacemaker::database::mysql_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-mysql --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file', 'NAME': 'mysql', 'STEP_CONFIG': "include ::tripleo::packages\n['Mysql_datadir', 'Mysql_user', 'Mysql_database', 'Mysql_grant', 'Mysql_plugin'].each |String $val| { noop_resource($val) }\nexec {'wait-for-settle': command => '/bin/true' }\ninclude tripleo::profile::pacemaker::database::mysql_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-mysql.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:09:04 np0005543227 puppet-user[66315]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Dec 3 09:09:04 np0005543227 puppet-user[66315]: in a future release. Use nova::cinder::os_region_name instead Dec 3 09:09:04 np0005543227 puppet-user[66315]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Dec 3 09:09:04 np0005543227 puppet-user[66315]: in a future release. Use nova::cinder::catalog_info instead Dec 3 09:09:04 np0005543227 puppet-user[66315]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Dec 3 09:09:04 np0005543227 puppet-user[66315]: removed in a future realse. Use nova::db::database_connection instead Dec 3 09:09:04 np0005543227 puppet-user[66315]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Dec 3 09:09:04 np0005543227 puppet-user[66315]: removed in a future realse. Use nova::db::api_database_connection instead Dec 3 09:09:04 np0005543227 puppet-user[66315]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Dec 3 09:09:04 np0005543227 puppet-user[66171]: Warning: Scope(Apache::Vhost[neutron-api-proxy]): Dec 3 09:09:04 np0005543227 puppet-user[66171]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:04 np0005543227 puppet-user[66171]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:04 np0005543227 puppet-user[66171]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:04 np0005543227 puppet-user[66171]: file names. Dec 3 09:09:04 np0005543227 puppet-user[66171]: Dec 3 09:09:04 np0005543227 puppet-user[66171]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:04 np0005543227 puppet-user[66171]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:04 np0005543227 puppet-user[66171]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:05 np0005543227 podman[66956]: 2025-12-03 09:09:05.074753255 +0000 UTC m=+0.053472848 container create d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, distribution-scope=public, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, release=1761123044, container_name=container-puppet-ovn_controller, konflux.additional-tags=17.1.12 17.1_20251118.1, url=https://www.redhat.com, build-date=2025-11-18T23:34:05Z, architecture=x86_64, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, tcib_managed=true, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-ovn-controller, com.redhat.component=openstack-ovn-controller-container, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272) Dec 3 09:09:05 np0005543227 systemd[1]: tmp-crun.GQRWCP.mount: Deactivated successfully. Dec 3 09:09:05 np0005543227 systemd[1]: var-lib-containers-storage-overlay-51bf1de1ab01eeefee261f10e47037c29e232ed417809b55fe7a2949709e1593-merged.mount: Deactivated successfully. Dec 3 09:09:05 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-7034573215a468118c4aa8c73552e81ed44bf03646d8546a9e853ee5c6dbea3e-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:05 np0005543227 systemd[1]: Started libpod-conmon-d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e.scope. Dec 3 09:09:05 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:05 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0822111f4fbe07e3899e5397582f35225318dc4afd2e5451c01d7a4f662dbb0d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:05 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/0822111f4fbe07e3899e5397582f35225318dc4afd2e5451c01d7a4f662dbb0d/merged/etc/sysconfig/modules supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:05 np0005543227 podman[66956]: 2025-12-03 09:09:05.13212192 +0000 UTC m=+0.110841493 container init d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, com.redhat.component=openstack-ovn-controller-container, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, vcs-type=git, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, build-date=2025-11-18T23:34:05Z, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-ovn_controller, distribution-scope=public, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, release=1761123044, url=https://www.redhat.com, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, name=rhosp17/openstack-ovn-controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, tcib_managed=true, version=17.1.12, architecture=x86_64, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:05 np0005543227 podman[66956]: 2025-12-03 09:09:05.138717553 +0000 UTC m=+0.117437136 container start d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, release=1761123044, distribution-scope=public, vcs-type=git, batch=17.1_20251118.1, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-ovn_controller, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-ovn-controller-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, summary=Red Hat OpenStack Platform 17.1 ovn-controller, maintainer=OpenStack TripleO Team, version=17.1.12, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.4, name=rhosp17/openstack-ovn-controller, io.openshift.expose-services=, build-date=2025-11-18T23:34:05Z, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272) Dec 3 09:09:05 np0005543227 podman[66956]: 2025-12-03 09:09:05.140347224 +0000 UTC m=+0.119066797 container attach d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, url=https://www.redhat.com, container_name=container-puppet-ovn_controller, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 ovn-controller, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 ovn-controller, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2025-11-18T23:34:05Z, maintainer=OpenStack TripleO Team, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, architecture=x86_64, managed_by=tripleo_ansible, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., version=17.1.12, release=1761123044, name=rhosp17/openstack-ovn-controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-ovn-controller-container, tcib_managed=true) Dec 3 09:09:05 np0005543227 podman[66956]: 2025-12-03 09:09:05.047700121 +0000 UTC m=+0.026419704 image pull registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.68 seconds Dec 3 09:09:05 np0005543227 systemd[1]: libpod-ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315.scope: Deactivated successfully. Dec 3 09:09:05 np0005543227 systemd[1]: libpod-ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315.scope: Consumed 5.370s CPU time. Dec 3 09:09:05 np0005543227 podman[65386]: 2025-12-03 09:09:05.293793428 +0000 UTC m=+5.987043391 container died ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, version=17.1.12, name=rhosp17/openstack-manila-api, url=https://www.redhat.com, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, io.openshift.expose-services=, batch=17.1_20251118.1, container_name=container-puppet-manila, description=Red Hat OpenStack Platform 17.1 manila-api, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-19T00:21:10Z, summary=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.component=openstack-manila-api-container, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, managed_by=tripleo_ansible, tcib_managed=true, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, distribution-scope=public, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4) Dec 3 09:09:05 np0005543227 podman[67022]: 2025-12-03 09:09:05.386636007 +0000 UTC m=+0.081794580 container cleanup ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315 (image=registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1, name=container-puppet-manila, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 manila-api, managed_by=tripleo_ansible, container_name=container-puppet-manila, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, name=rhosp17/openstack-manila-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-manila-api, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 manila-api, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 manila-api, build-date=2025-11-19T00:21:10Z, io.buildah.version=1.41.4, com.redhat.component=openstack-manila-api-container, org.opencontainers.image.revision=e524e8624374da8fd36528d85fe944fe2450d351, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 manila-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., architecture=x86_64, release=1761123044, distribution-scope=public, batch=17.1_20251118.1, vcs-ref=e524e8624374da8fd36528d85fe944fe2450d351, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:05 np0005543227 systemd[1]: libpod-conmon-ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315.scope: Deactivated successfully. Dec 3 09:09:05 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-manila --conmon-pidfile /run/container-puppet-manila.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line --env NAME=manila --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::manila::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::manila::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::pacemaker::manila::share_bundle#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-manila --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,manila_config,manila_api_paste_ini,manila_config,manila_scheduler_paste_ini,manila_config,file,concat,file_line', 'NAME': 'manila', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::manila::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::manila::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::pacemaker::manila::share_bundle\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-manila.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1 Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/bind_host]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/auth_strategy]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/core_plugin]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/host]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dns_domain]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/dhcp_agent_notification]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/allow_overlapping_ips]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/global_physnet_mtu]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/vlan_transparent]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[agent/root_helper]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[agent/report_interval]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Neutron_config[DEFAULT/service_plugins]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_url]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/username]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/password]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_domain_name]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/project_name]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/user_domain_name]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/region_name]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/endpoint_type]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Notifications::Nova/Neutron_config[nova/auth_type]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66315]: Warning: Unknown variable: '::nova::scheduler::filter::scheduler_max_attempts'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 122, column: 29) Dec 3 09:09:05 np0005543227 puppet-user[66315]: Warning: Unknown variable: '::nova::scheduler::filter::periodic_task_interval'. (file: /etc/puppet/modules/nova/manifests/scheduler.pp, line: 123, column: 39) Dec 3 09:09:05 np0005543227 puppet-user[66315]: Warning: Scope(Class[Nova::Scheduler::Filter]): The nova::scheduler::filter::scheduler_max_attempts parameter has been deprecated and \ Dec 3 09:09:05 np0005543227 puppet-user[66315]: will be removed in a future release. Use the nova::scheduler::max_attempts parameter instead. Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_url]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/username]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/password]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_domain_name]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/project_name]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/user_domain_name]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/region_name]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server::Placement/Neutron_config[placement/auth_type]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/l3_ha]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/max_l3_agents_per_router]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/api_workers]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/rpc_workers]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/agent_down_time]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/router_scheduler_driver]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server/Neutron_config[DEFAULT/allow_automatic_l3agent_failover]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server/Neutron_config[ovs/igmp_snooping_enable]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_port]/ensure: created Dec 3 09:09:05 np0005543227 podman[67087]: 2025-12-03 09:09:05.787607422 +0000 UTC m=+0.087096643 container create e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vendor=Red Hat, Inc., vcs-type=git, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-placement, release=1761123044, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, com.redhat.component=openstack-placement-api-container, build-date=2025-11-18T23:41:26Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, url=https://www.redhat.com, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp17/openstack-placement-api, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 placement-api, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, version=17.1.12, maintainer=OpenStack TripleO Team) Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_security_group]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_network_gateway]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Quota/Neutron_config[quotas/quota_packet_filter]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/neutron/plugin.ini]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/File[/etc/default/neutron-server]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/type_drivers]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/tenant_network_types]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/mechanism_drivers]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/path_mtu]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/extension_drivers]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron_plugin_ml2[ml2/overlay_ip_version]/ensure: created Dec 3 09:09:05 np0005543227 systemd[1]: Started libpod-conmon-e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171.scope. Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Default[neutron_config]/Neutron_config[DEFAULT/control_exchange]/ensure: created Dec 3 09:09:05 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Oslo::Concurrency[neutron_config]/Neutron_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:09:05 np0005543227 podman[67087]: 2025-12-03 09:09:05.743541235 +0000 UTC m=+0.043030486 image pull registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Dec 3 09:09:05 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/d71f6ce6c2f6faae91c6d022364e0d09f5f11e58e26162ab2282e50c5afcd40d/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Notifications[neutron_config]/Neutron_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:05 np0005543227 podman[67087]: 2025-12-03 09:09:05.85413049 +0000 UTC m=+0.153619721 container init e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, version=17.1.12, description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, io.openshift.expose-services=, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, managed_by=tripleo_ansible, release=1761123044, architecture=x86_64, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-placement-api-container, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-placement, build-date=2025-11-18T23:41:26Z, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-placement-api, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, tcib_managed=true, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:05 np0005543227 podman[67087]: 2025-12-03 09:09:05.863380104 +0000 UTC m=+0.162869325 container start e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, container_name=container-puppet-placement, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, architecture=x86_64, distribution-scope=public, url=https://www.redhat.com, tcib_managed=true, maintainer=OpenStack TripleO Team, vcs-type=git, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.expose-services=, version=17.1.12, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-placement-api-container, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., release=1761123044, build-date=2025-11-18T23:41:26Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-placement-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d) Dec 3 09:09:05 np0005543227 podman[67087]: 2025-12-03 09:09:05.863580471 +0000 UTC m=+0.163069692 container attach e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, architecture=x86_64, com.redhat.component=openstack-placement-api-container, tcib_managed=true, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., name=rhosp17/openstack-placement-api, container_name=container-puppet-placement, build-date=2025-11-18T23:41:26Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 placement-api, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, batch=17.1_20251118.1, url=https://www.redhat.com, distribution-scope=public, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 placement-api, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api) Dec 3 09:09:05 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron/Oslo::Messaging::Rabbit[neutron_config]/Neutron_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:05 np0005543227 ovs-vsctl[67180]: ovs|00001|db_ctl_base|ERR|unix:/var/run/openvswitch/db.sock: database connection failed (No such file or directory) Dec 3 09:09:05 np0005543227 puppet-user[66778]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:05 np0005543227 puppet-user[66778]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:05 np0005543227 puppet-user[66778]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:05 np0005543227 puppet-user[66778]: (file & line not available) Dec 3 09:09:05 np0005543227 puppet-user[66778]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:05 np0005543227 puppet-user[66778]: (file & line not available) Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/debug]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66778]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.08 seconds Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Logging/Oslo::Log[neutron_config]/Neutron_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66778]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/File[/etc/logrotate-crond.conf]/ensure: defined content as '{sha256}1c3202f58bd2ae16cb31badcbb7f0d4e6697157b987d1887736ad96bb73d70b0' Dec 3 09:09:06 np0005543227 puppet-user[66778]: Notice: /Stage[main]/Tripleo::Profile::Base::Logging::Logrotate/Cron[logrotate-crond]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66778]: Notice: Applied catalog in 0.04 seconds Dec 3 09:09:06 np0005543227 puppet-user[66778]: Application: Dec 3 09:09:06 np0005543227 puppet-user[66778]: Initial environment: production Dec 3 09:09:06 np0005543227 puppet-user[66778]: Converged environment: production Dec 3 09:09:06 np0005543227 puppet-user[66778]: Run mode: user Dec 3 09:09:06 np0005543227 puppet-user[66778]: Changes: Dec 3 09:09:06 np0005543227 puppet-user[66778]: Total: 2 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Events: Dec 3 09:09:06 np0005543227 puppet-user[66778]: Success: 2 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Total: 2 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Resources: Dec 3 09:09:06 np0005543227 puppet-user[66778]: Changed: 2 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Out of sync: 2 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Skipped: 7 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Total: 9 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Time: Dec 3 09:09:06 np0005543227 puppet-user[66778]: File: 0.01 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Cron: 0.01 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Transaction evaluation: 0.04 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Catalog application: 0.04 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Config retrieval: 0.10 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Last run: 1764752946 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Total: 0.04 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Version: Dec 3 09:09:06 np0005543227 puppet-user[66778]: Config: 1764752945 Dec 3 09:09:06 np0005543227 puppet-user[66778]: Puppet: 7.10.0 Dec 3 09:09:06 np0005543227 systemd[1]: var-lib-containers-storage-overlay-75bc018be98d804c2e708a54978ec29ce878a7f547e75a8ecd056b9fbb6f0d4a-merged.mount: Deactivated successfully. Dec 3 09:09:06 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-ce1628aefbe052d9de3953c9125ccdb0d042a82c76fb178e7e44c9d48e2f1315-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:06 np0005543227 puppet-user[66315]: Warning: Scope(Apache::Vhost[nova_api_wsgi]): Dec 3 09:09:06 np0005543227 puppet-user[66315]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:06 np0005543227 puppet-user[66315]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:06 np0005543227 puppet-user[66315]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:06 np0005543227 puppet-user[66315]: file names. Dec 3 09:09:06 np0005543227 puppet-user[66315]: Dec 3 09:09:06 np0005543227 puppet-user[66315]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:06 np0005543227 puppet-user[66315]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:06 np0005543227 puppet-user[66315]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66759]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:06 np0005543227 puppet-user[66759]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:06 np0005543227 puppet-user[66759]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:06 np0005543227 puppet-user[66759]: (file & line not available) Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Keystone::Authtoken/Keystone::Resource::Authtoken[neutron_config]/Neutron_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}5c902aa3c0763871a979109c49ed76fec319f3bf35a2609f2a0e8255a8604e4b' Dec 3 09:09:06 np0005543227 puppet-user[66759]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:06 np0005543227 puppet-user[66759]: (file & line not available) Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.65 seconds Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/connection]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/max_retries]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Db/Oslo::Db[neutron_config]/Neutron_config[database/db_max_retries]/ensure: created Dec 3 09:09:06 np0005543227 systemd[1]: libpod-8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f.scope: Deactivated successfully. Dec 3 09:09:06 np0005543227 systemd[1]: libpod-8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f.scope: Consumed 2.093s CPU time. Dec 3 09:09:06 np0005543227 podman[66735]: 2025-12-03 09:09:06.355336961 +0000 UTC m=+2.384195506 container died 8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, summary=Red Hat OpenStack Platform 17.1 cron, name=rhosp17/openstack-cron, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-crond, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, version=17.1.12, distribution-scope=public, tcib_managed=true, com.redhat.component=openstack-cron-container, description=Red Hat OpenStack Platform 17.1 cron, config_id=tripleo_puppet_step1, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:32Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron) Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Policy/Oslo::Policy[neutron_config]/Neutron_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Server/Oslo::Middleware[neutron_config]/Neutron_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/max_header_size]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[geneve]/Neutron_plugin_ml2[ml2_type_geneve/vni_ranges]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vxlan_group]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vxlan]/Neutron_plugin_ml2[ml2_type_vxlan/vni_ranges]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[vlan]/Neutron_plugin_ml2[ml2_type_vlan/network_vlan_ranges]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66759]: Warning: Scope(Class[Nova]): The os_region_name parameter is deprecated and will be removed \ Dec 3 09:09:06 np0005543227 puppet-user[66759]: in a future release. Use nova::cinder::os_region_name instead Dec 3 09:09:06 np0005543227 puppet-user[66759]: Warning: Scope(Class[Nova]): The catalog_info parameter is deprecated and will be removed \ Dec 3 09:09:06 np0005543227 puppet-user[66759]: in a future release. Use nova::cinder::catalog_info instead Dec 3 09:09:06 np0005543227 puppet-user[66759]: Warning: Scope(Class[Nova]): The database_connection parameter is deprecated and will be \ Dec 3 09:09:06 np0005543227 puppet-user[66759]: removed in a future realse. Use nova::db::database_connection instead Dec 3 09:09:06 np0005543227 puppet-user[66759]: Warning: Scope(Class[Nova]): The api_database_connection parameter is deprecated and will be \ Dec 3 09:09:06 np0005543227 puppet-user[66759]: removed in a future realse. Use nova::db::api_database_connection instead Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2/Neutron::Plugins::Ml2::Type_driver[flat]/Neutron_plugin_ml2[ml2_type_flat/flat_networks]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_connection]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_connection]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_private_key]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_certificate]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_nb_ca_cert]/ensure: created Dec 3 09:09:06 np0005543227 systemd[1]: tmp-crun.KdFZOm.mount: Deactivated successfully. Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_private_key]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_certificate]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_sb_ca_cert]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_connection_timeout]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovsdb_probe_interval]/ensure: created Dec 3 09:09:06 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/neutron_sync_mode]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_metadata_enabled]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/enable_distributed_floating_ip]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/dns_servers]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[ovn/ovn_emit_need_to_frag]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/rate_limit]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Neutron::Plugins::Ml2::Ovn/Neutron_plugin_ml2[network_log/burst_limit]/ensure: created Dec 3 09:09:06 np0005543227 podman[67281]: 2025-12-03 09:09:06.449544011 +0000 UTC m=+0.084488652 container cleanup 8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f (image=registry.redhat.io/rhosp-rhel9/openstack-cron:17.1, name=container-puppet-crond, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-crond, name=rhosp17/openstack-cron, summary=Red Hat OpenStack Platform 17.1 cron, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, architecture=x86_64, io.buildah.version=1.41.4, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-cron, tcib_managed=true, build-date=2025-11-18T22:49:32Z, batch=17.1_20251118.1, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 cron, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-cron-container, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 cron, io.k8s.description=Red Hat OpenStack Platform 17.1 cron, vcs-type=git, vendor=Red Hat, Inc., release=1761123044) Dec 3 09:09:06 np0005543227 systemd[1]: libpod-conmon-8dc30309dc6ea6dfa495b61d9ea1f00c634f47cb574539cabe586f1a65c14d7f.scope: Deactivated successfully. Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Dec 3 09:09:06 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-crond --conmon-pidfile /run/container-puppet-crond.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron --env NAME=crond --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::logrotate --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-crond --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron', 'NAME': 'crond', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::logrotate'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cron:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-crond.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-cron:17.1 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: /Stage[main]/Tripleo::Profile::Base::Neutron::Server/Tripleo::Tls_proxy[neutron-api]/Apache::Vhost[neutron-api-proxy]/Concat[25-neutron-api-proxy.conf]/File[/etc/httpd/conf.d/25-neutron-api-proxy.conf]/ensure: defined content as '{sha256}bceaba79501535907057339af4a808de6fe0ba892975eae0b91c0bc3e83a7aa3' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66759]: Warning: Unknown variable: '::nova::compute::verify_glance_signatures'. (file: /etc/puppet/modules/nova/manifests/glance.pp, line: 62, column: 41) Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:06 np0005543227 puppet-user[66171]: Notice: Applied catalog in 1.28 seconds Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}b8a60ed04f45c2616ded10652c00040e1164ef72f6b6380e0c48acddb632b617' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Application: Dec 3 09:09:06 np0005543227 puppet-user[66171]: Initial environment: production Dec 3 09:09:06 np0005543227 puppet-user[66171]: Converged environment: production Dec 3 09:09:06 np0005543227 puppet-user[66171]: Run mode: user Dec 3 09:09:06 np0005543227 puppet-user[66171]: Changes: Dec 3 09:09:06 np0005543227 puppet-user[66171]: Total: 137 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Events: Dec 3 09:09:06 np0005543227 puppet-user[66171]: Success: 137 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Total: 137 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Resources: Dec 3 09:09:06 np0005543227 puppet-user[66171]: Changed: 137 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Out of sync: 137 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Skipped: 41 Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:09:06 np0005543227 puppet-user[66171]: Total: 384 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Time: Dec 3 09:09:06 np0005543227 puppet-user[66171]: Resources: 0.00 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Concat file: 0.00 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Concat fragment: 0.00 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Augeas: 0.02 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Package: 0.02 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Neutron plugin ml2: 0.06 Dec 3 09:09:06 np0005543227 puppet-user[66171]: File: 0.11 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Neutron config: 0.80 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Transaction evaluation: 1.26 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Catalog application: 1.28 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Config retrieval: 1.83 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Last run: 1764752946 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Total: 1.28 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Version: Dec 3 09:09:06 np0005543227 puppet-user[66171]: Config: 1764752943 Dec 3 09:09:06 np0005543227 puppet-user[66171]: Puppet: 7.10.0 Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/File[nova_api_wsgi]/ensure: defined content as '{sha256}901cc9636a87a089b1b6620430d7a36909add0ca7dc2216b74d7bb9dc627d776' Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66995]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:06 np0005543227 puppet-user[66995]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:06 np0005543227 puppet-user[66995]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:06 np0005543227 puppet-user[66995]: (file & line not available) Dec 3 09:09:06 np0005543227 podman[67355]: 2025-12-03 09:09:06.932647375 +0000 UTC m=+0.100535126 container create 6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, url=https://www.redhat.com, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-rabbitmq, release=1761123044, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., batch=17.1_20251118.1, com.redhat.component=openstack-rabbitmq-container, managed_by=tripleo_ansible, container_name=container-puppet-rabbitmq, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, build-date=2025-11-18T22:49:50Z, description=Red Hat OpenStack Platform 17.1 rabbitmq, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=) Dec 3 09:09:06 np0005543227 puppet-user[66995]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:06 np0005543227 puppet-user[66995]: (file & line not available) Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Dec 3 09:09:06 np0005543227 systemd[1]: Started libpod-conmon-6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f.scope. Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Dec 3 09:09:06 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:06 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/bea85bc39f6c03edd71bbc9b891cfeaad4a3521e24126b1bc202eed69ee102fb/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Dec 3 09:09:06 np0005543227 podman[67355]: 2025-12-03 09:09:06.988247847 +0000 UTC m=+0.156135628 container init 6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, url=https://www.redhat.com, batch=17.1_20251118.1, name=rhosp17/openstack-rabbitmq, config_id=tripleo_puppet_step1, io.openshift.expose-services=, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, container_name=container-puppet-rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-rabbitmq-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, build-date=2025-11-18T22:49:50Z, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, release=1761123044, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rabbitmq, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12) Dec 3 09:09:06 np0005543227 podman[67355]: 2025-12-03 09:09:06.891319693 +0000 UTC m=+0.059207494 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 09:09:06 np0005543227 podman[67355]: 2025-12-03 09:09:06.995671955 +0000 UTC m=+0.163559706 container start 6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:50Z, distribution-scope=public, managed_by=tripleo_ansible, container_name=container-puppet-rabbitmq, config_id=tripleo_puppet_step1, url=https://www.redhat.com, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-rabbitmq, architecture=x86_64, com.redhat.component=openstack-rabbitmq-container, io.openshift.expose-services=, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq) Dec 3 09:09:06 np0005543227 podman[67355]: 2025-12-03 09:09:06.995848821 +0000 UTC m=+0.163736602 container attach 6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, url=https://www.redhat.com, vcs-type=git, vendor=Red Hat, Inc., tcib_managed=true, description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.component=openstack-rabbitmq-container, architecture=x86_64, distribution-scope=public, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, name=rhosp17/openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-rabbitmq, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 rabbitmq, release=1761123044, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, build-date=2025-11-18T22:49:50Z, io.openshift.expose-services=, version=17.1.12, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:06 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Dec 3 09:09:07 np0005543227 systemd[1]: var-lib-containers-storage-overlay-a362315ad58d45f769cf3853f121ef0b3db8686af96944994e316a3bd0cac8dd-merged.mount: Deactivated successfully. Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.22 seconds Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67464]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:172.17.0.103:6642,ssl:172.17.0.104:6642,ssl:172.17.0.105:6642 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67467]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-type]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67474]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=172.19.0.105 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-ip]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/instance_name_template]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/enabled_apis]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Nova_config[wsgi/api_paste_config]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67477]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005543227.ooo.test Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:hostname]/value: value changed 'np0005543227.novalocal' to 'np0005543227.ooo.test' Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_listen_port]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/osapi_compute_workers]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67479]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Nova_config[api/use_forwarded_for]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Nova_config[api/max_limit]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67481]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Dec 3 09:09:07 np0005543227 systemd[1]: libpod-a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f.scope: Deactivated successfully. Dec 3 09:09:07 np0005543227 systemd[1]: libpod-a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f.scope: Consumed 5.396s CPU time. Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-remote-probe-interval]/ensure: created Dec 3 09:09:07 np0005543227 podman[66088]: 2025-12-03 09:09:07.363373087 +0000 UTC m=+5.779594734 container died a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:23:27Z, description=Red Hat OpenStack Platform 17.1 neutron-server, batch=17.1_20251118.1, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, version=17.1.12, org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, tcib_managed=true, vcs-type=git, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, com.redhat.component=openstack-neutron-server-container, name=rhosp17/openstack-neutron-server, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-neutron, release=1761123044, summary=Red Hat OpenStack Platform 17.1 neutron-server, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, url=https://www.redhat.com) Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Nova_config[DEFAULT/allow_resize_to_same_host]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67497]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-openflow-probe-interval]/ensure: created Dec 3 09:09:07 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:07 np0005543227 systemd[1]: var-lib-containers-storage-overlay-3b44830e308e77d1703b3978241ad14aab26256ae212206672bbef2d05adf2f0-merged.mount: Deactivated successfully. Dec 3 09:09:07 np0005543227 ovs-vsctl[67505]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=true Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-monitor-all]/ensure: created Dec 3 09:09:07 np0005543227 podman[67488]: 2025-12-03 09:09:07.484454845 +0000 UTC m=+0.110860845 container cleanup a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f (image=registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1, name=container-puppet-neutron, io.buildah.version=1.41.4, url=https://www.redhat.com, managed_by=tripleo_ansible, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, build-date=2025-11-19T00:23:27Z, description=Red Hat OpenStack Platform 17.1 neutron-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-neutron-server, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 neutron-server, container_name=container-puppet-neutron, release=1761123044, config_id=tripleo_puppet_step1, name=rhosp17/openstack-neutron-server, vendor=Red Hat, Inc., org.opencontainers.image.revision=89d55f10f82ff50b4f24de36868d7c635c279c7c, summary=Red Hat OpenStack Platform 17.1 neutron-server, io.openshift.expose-services=, architecture=x86_64, vcs-ref=89d55f10f82ff50b4f24de36868d7c635c279c7c, tcib_managed=true, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 neutron-server, com.redhat.component=openstack-neutron-server-container) Dec 3 09:09:07 np0005543227 systemd[1]: libpod-conmon-a4482c408e56a1696308d96052de021d6854441ce9a1108695de614388bd333f.scope: Deactivated successfully. Dec 3 09:09:07 np0005543227 ovs-vsctl[67509]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Dec 3 09:09:07 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-neutron --conmon-pidfile /run/container-puppet-neutron.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2 --env NAME=neutron --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::server#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::neutron::plugins::ml2#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-neutron --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,neutron_config,neutron_api_paste_ini,neutron_plugin_ml2', 'NAME': 'neutron', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::server\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::neutron::plugins::ml2\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-neutron.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-neutron-server:17.1 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-ofctrl-wait-before-clear]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67523]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-tos=0 Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-encap-tos]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67530]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-chassis-mac-mappings=datacentre:fa:16:3e:2f:c0:b0 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-chassis-mac-mappings]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67535]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=datacentre:br-ex Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-bridge-mappings]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Dec 3 09:09:07 np0005543227 ovs-vsctl[67554]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:ovn-match-northd-version]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66759]: Warning: Scope(Apache::Vhost[nova_metadata_wsgi]): Dec 3 09:09:07 np0005543227 puppet-user[66759]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:07 np0005543227 puppet-user[66759]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:07 np0005543227 puppet-user[66759]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:07 np0005543227 puppet-user[66759]: file names. Dec 3 09:09:07 np0005543227 puppet-user[66759]: Dec 3 09:09:07 np0005543227 puppet-user[66759]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:07 np0005543227 puppet-user[66759]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:07 np0005543227 puppet-user[66759]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:07 np0005543227 ovs-vsctl[67578]: ovs|00001|vsctl|INFO|Called as /usr/bin/ovs-vsctl set Open_vSwitch . external_ids:garp-max-timeout-sec=0 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: /Stage[main]/Ovn::Controller/Vs_config[external_ids:garp-max-timeout-sec]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66995]: Notice: Applied catalog in 0.51 seconds Dec 3 09:09:07 np0005543227 puppet-user[66995]: Application: Dec 3 09:09:07 np0005543227 puppet-user[66995]: Initial environment: production Dec 3 09:09:07 np0005543227 puppet-user[66995]: Converged environment: production Dec 3 09:09:07 np0005543227 puppet-user[66995]: Run mode: user Dec 3 09:09:07 np0005543227 puppet-user[66995]: Changes: Dec 3 09:09:07 np0005543227 puppet-user[66995]: Total: 14 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Events: Dec 3 09:09:07 np0005543227 puppet-user[66995]: Success: 14 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Total: 14 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Resources: Dec 3 09:09:07 np0005543227 puppet-user[66995]: Skipped: 12 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Changed: 14 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Out of sync: 14 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Total: 29 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Time: Dec 3 09:09:07 np0005543227 puppet-user[66995]: Exec: 0.02 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Config retrieval: 0.25 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Vs config: 0.43 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Transaction evaluation: 0.50 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Catalog application: 0.51 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Last run: 1764752947 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Total: 0.51 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Version: Dec 3 09:09:07 np0005543227 puppet-user[66995]: Config: 1764752946 Dec 3 09:09:07 np0005543227 puppet-user[66995]: Puppet: 7.10.0 Dec 3 09:09:07 np0005543227 puppet-user[67173]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:07 np0005543227 puppet-user[67173]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:07 np0005543227 puppet-user[67173]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:07 np0005543227 puppet-user[67173]: (file & line not available) Dec 3 09:09:07 np0005543227 puppet-user[67173]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:07 np0005543227 puppet-user[67173]: (file & line not available) Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66759]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.62 seconds Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Conductor/Nova_config[conductor/workers]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/workers]/ensure: created Dec 3 09:09:07 np0005543227 podman[67642]: 2025-12-03 09:09:07.870659775 +0000 UTC m=+0.074513035 container create c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, build-date=2025-11-18T22:49:49Z, release=1761123044, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., io.buildah.version=1.41.4, com.redhat.component=openstack-redis-container, summary=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, tcib_managed=true, distribution-scope=public, url=https://www.redhat.com, name=rhosp17/openstack-redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, container_name=container-puppet-redis, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 redis) Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/discover_hosts_in_cells_interval]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_image_type_support]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/limit_tenants_to_placement_aggregate]/ensure: created Dec 3 09:09:07 np0005543227 systemd[1]: Started libpod-conmon-c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c.scope. Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/placement_aggregate_required_for_tenants]/ensure: created Dec 3 09:09:07 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:07 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7723ba5d755aa4dd3ab0201a4f0c8a96690caeabb82a48e6d77a4e64629787a8/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/enable_isolated_aggregate_filtering]/ensure: created Dec 3 09:09:07 np0005543227 podman[67642]: 2025-12-03 09:09:07.924202234 +0000 UTC m=+0.128055494 container init c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, architecture=x86_64, build-date=2025-11-18T22:49:49Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, version=17.1.12, container_name=container-puppet-redis, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, maintainer=OpenStack TripleO Team, release=1761123044, summary=Red Hat OpenStack Platform 17.1 redis, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, com.redhat.component=openstack-redis-container, name=rhosp17/openstack-redis, tcib_managed=true, distribution-scope=public, batch=17.1_20251118.1, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 redis, io.buildah.version=1.41.4, vendor=Red Hat, Inc., org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a) Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_availability_zone]/ensure: created Dec 3 09:09:07 np0005543227 podman[67642]: 2025-12-03 09:09:07.82955986 +0000 UTC m=+0.033413140 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 09:09:07 np0005543227 podman[67642]: 2025-12-03 09:09:07.930357873 +0000 UTC m=+0.134211133 container start c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, com.redhat.component=openstack-redis-container, summary=Red Hat OpenStack Platform 17.1 redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, architecture=x86_64, build-date=2025-11-18T22:49:49Z, managed_by=tripleo_ansible, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., config_id=tripleo_puppet_step1, tcib_managed=true, vcs-type=git, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, batch=17.1_20251118.1, name=rhosp17/openstack-redis, container_name=container-puppet-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team) Dec 3 09:09:07 np0005543227 podman[67642]: 2025-12-03 09:09:07.930546959 +0000 UTC m=+0.134400219 container attach c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, description=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, batch=17.1_20251118.1, tcib_managed=true, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-redis, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 redis, version=17.1.12, com.redhat.component=openstack-redis-container, container_name=container-puppet-redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, build-date=2025-11-18T22:49:49Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, managed_by=tripleo_ansible, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, config_id=tripleo_puppet_step1, url=https://www.redhat.com, vendor=Red Hat, Inc.) Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler/Nova_config[scheduler/query_placement_for_routed_network_aggregates]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/host_subset_size]/ensure: created Dec 3 09:09:07 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/weight_classes]/ensure: created Dec 3 09:09:08 np0005543227 systemd[1]: libpod-d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e.scope: Deactivated successfully. Dec 3 09:09:08 np0005543227 systemd[1]: libpod-d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e.scope: Consumed 2.682s CPU time. Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Scheduler::Filter/Nova_config[filter_scheduler/shuffle_best_same_weighed_hosts]/ensure: created Dec 3 09:09:08 np0005543227 podman[67701]: 2025-12-03 09:09:08.099369886 +0000 UTC m=+0.039061603 container died d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, version=17.1.12, distribution-scope=public, url=https://www.redhat.com, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, tcib_managed=true, build-date=2025-11-18T23:34:05Z, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, summary=Red Hat OpenStack Platform 17.1 ovn-controller, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 ovn-controller, architecture=x86_64, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, com.redhat.component=openstack-ovn-controller-container, container_name=container-puppet-ovn_controller, name=rhosp17/openstack-ovn-controller, vcs-type=git, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, release=1761123044) Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_ca_certs]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_cert]/ensure: created Dec 3 09:09:08 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:08 np0005543227 systemd[1]: var-lib-containers-storage-overlay-0822111f4fbe07e3899e5397582f35225318dc4afd2e5451c01d7a4f662dbb0d-merged.mount: Deactivated successfully. Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/vencrypt_client_key]/ensure: created Dec 3 09:09:08 np0005543227 podman[67701]: 2025-12-03 09:09:08.132698642 +0000 UTC m=+0.072390349 container cleanup d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e (image=registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1, name=container-puppet-ovn_controller, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, io.buildah.version=1.41.4, name=rhosp17/openstack-ovn-controller, vcs-type=git, tcib_managed=true, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-ovn-controller, description=Red Hat OpenStack Platform 17.1 ovn-controller, managed_by=tripleo_ansible, container_name=container-puppet-ovn_controller, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 ovn-controller, build-date=2025-11-18T23:34:05Z, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, org.opencontainers.image.revision=ae875c168a6ec3400acf0a639b71f4bcc4adf272, com.redhat.component=openstack-ovn-controller-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 ovn-controller, vendor=Red Hat, Inc., distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 ovn-controller, vcs-ref=ae875c168a6ec3400acf0a639b71f4bcc4adf272, batch=17.1_20251118.1) Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_host]/ensure: created Dec 3 09:09:08 np0005543227 systemd[1]: libpod-conmon-d854ebe836937539c0c89ce7d22526a31ba26fdffbc61414332489d5bb0bd89e.scope: Deactivated successfully. Dec 3 09:09:08 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-ovn_controller --conmon-pidfile /run/container-puppet-ovn_controller.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,vs_config,exec --env NAME=ovn_controller --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::neutron::agents::ovn#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-ovn_controller --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,vs_config,exec', 'NAME': 'ovn_controller', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::neutron::agents::ovn\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/etc/sysconfig/modules:/etc/sysconfig/modules', '/lib/modules:/lib/modules:ro', '/run/openvswitch:/run/openvswitch:shared,z', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-ovn_controller.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /etc/sysconfig/modules:/etc/sysconfig/modules --volume /lib/modules:/lib/modules:ro --volume /run/openvswitch:/run/openvswitch:shared,z --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-ovn-controller:17.1 Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/novncproxy_port]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Vncproxy/Nova_config[vnc/auth_schemes]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}22919079f5de3fecd0e6d991670d896cd7725c46701dbde26ca064af36c4bcba' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/ssl_only]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/cert]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/key]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[console/ssl_minimum_version]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/my_ip]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/host]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/dhcp_domain]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[vif_plug_ovs/ovsdb_connection]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[notifications/notification_format]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/state_path]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/service_down_time]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/rootwrap_config]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[DEFAULT/report_interval]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[notifications/notify_on_state_change]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Nova_config[cinder/cross_az_attach]/ensure: created Dec 3 09:09:08 np0005543227 podman[67774]: 2025-12-03 09:09:08.653441165 +0000 UTC m=+0.096338636 container create b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, batch=17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=container-puppet-rsyslog, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.expose-services=, distribution-scope=public, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, com.redhat.component=openstack-rsyslog-container, build-date=2025-11-18T22:49:49Z, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, architecture=x86_64, name=rhosp17/openstack-rsyslog, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, config_id=tripleo_puppet_step1, version=17.1.12, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:08 np0005543227 systemd[1]: Started libpod-conmon-b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197.scope. Dec 3 09:09:08 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:08 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c3c8e78bcd86d907edecbc2c64174e2ea0237dce8ccb0c7958ca2eb3b2fa2c12/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:08 np0005543227 podman[67774]: 2025-12-03 09:09:08.707677605 +0000 UTC m=+0.150575106 container init b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, com.redhat.component=openstack-rsyslog-container, container_name=container-puppet-rsyslog, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., release=1761123044, summary=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 rsyslog, io.openshift.expose-services=, name=rhosp17/openstack-rsyslog, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, build-date=2025-11-18T22:49:49Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.4, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, config_id=tripleo_puppet_step1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Dec 3 09:09:08 np0005543227 podman[67774]: 2025-12-03 09:09:08.61004527 +0000 UTC m=+0.052942811 image pull registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Dec 3 09:09:08 np0005543227 podman[67774]: 2025-12-03 09:09:08.719269173 +0000 UTC m=+0.162166664 container start b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, io.openshift.expose-services=, build-date=2025-11-18T22:49:49Z, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, config_id=tripleo_puppet_step1, version=17.1.12, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-rsyslog-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-type=git, url=https://www.redhat.com, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, architecture=x86_64, name=rhosp17/openstack-rsyslog, container_name=container-puppet-rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 rsyslog, managed_by=tripleo_ansible, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}) Dec 3 09:09:08 np0005543227 podman[67774]: 2025-12-03 09:09:08.719638204 +0000 UTC m=+0.162535695 container attach b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, vcs-type=git, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 rsyslog, config_id=tripleo_puppet_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, version=17.1.12, url=https://www.redhat.com, io.openshift.expose-services=, com.redhat.component=openstack-rsyslog-container, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., name=rhosp17/openstack-rsyslog, build-date=2025-11-18T22:49:49Z, container_name=container-puppet-rsyslog, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 rsyslog, tcib_managed=true, io.buildah.version=1.41.4, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, architecture=x86_64) Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Glance/Nova_config[glance/valid_interfaces]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[67173]: Warning: Scope(Apache::Vhost[placement_wsgi]): Dec 3 09:09:08 np0005543227 puppet-user[67173]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:08 np0005543227 puppet-user[67173]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:08 np0005543227 puppet-user[67173]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:08 np0005543227 puppet-user[67173]: file names. Dec 3 09:09:08 np0005543227 puppet-user[67173]: Dec 3 09:09:08 np0005543227 puppet-user[67173]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:08 np0005543227 puppet-user[67173]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:08 np0005543227 puppet-user[67173]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_type]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/auth_url]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/password]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_domain_name]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/project_name]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/user_domain_name]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/username]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/region_name]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Placement/Nova_config[placement/valid_interfaces]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[67173]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.27 seconds Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_is_fatal]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[DEFAULT/vif_plugging_timeout]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/default_floating_pool]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/timeout]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_name]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/project_domain_name]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/region_name]/ensure: created Dec 3 09:09:08 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/username]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/user_domain_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/password]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_url]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/valid_interfaces]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/ovs_bridge]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/extension_sync_interval]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Network::Neutron/Nova_config[neutron/auth_type]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Metadata/Nova_config[api/local_metadata_per_cell]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/service_metadata_proxy]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Metadata/Nova_config[neutron/metadata_proxy_shared_secret]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/File[/etc/my.cnf.d/tripleo.cnf]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Tripleo::Profile::Base::Database::Mysql::Client/Augeas[tripleo-mysql-client-conf]/returns: executed successfully Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/project_domain_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Vendordata/Nova_config[vendordata_dynamic_auth/user_domain_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/debug]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_file]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Logging/Oslo::Log[placement_config]/Placement_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/debug]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Logging/Oslo::Log[nova_config]/Nova_config[DEFAULT/log_dir]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Db/Oslo::Db[placement_config]/Placement_config[placement_database/connection]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Keystone::Authtoken/Keystone::Resource::Authtoken[placement_config]/Placement_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}0889d5d4162a37cb7c01c0b4592bff319a68ed3234db4c6fe76b038263afa24e' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/backend]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/enabled]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_scope]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/enforce_new_defaults]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Policy/Oslo::Policy[placement_config]/Placement_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/memcache_servers]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Wsgi/File[wsgi.conf]/ensure: defined content as '{sha256}19cb9bd7248ea35b8e882d1d21458b114cfa18be60fb8acbf1eb5cc9cab1afb7' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Wsgi::Apache/File[/etc/httpd/conf.d/00-placement-api.conf]/content: content changed '{sha256}829e74856246ff8f4a56a4995cd421edd210e3c0342c998de9e934d33c2d229f' to '{sha256}a742a33fca7bd0225b70d9c9c3f9977f3f5b1391a7c4db389c2e405e7a0e7ecc' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Wsgi/Apache::Mod[wsgi]/File[wsgi.load]/ensure: defined content as '{sha256}ca7e6bca762fed4f5860c5961f7d7873dfa06890a8dae109803984f2a57c857d' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[/var/www/cgi-bin/placement]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/File[placement_wsgi]/ensure: defined content as '{sha256}7330573e2f484b77671e7cd10bec4bf8fe4471ba5a127b8362286c6c89a050fe' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: /Stage[main]/Placement::Wsgi::Apache/Openstacklib::Wsgi::Apache[placement_wsgi]/Apache::Vhost[placement_wsgi]/Concat[10-placement_wsgi.conf]/File[/etc/httpd/conf.d/10-placement_wsgi.conf]/ensure: defined content as '{sha256}7c7912011b897422158a36f6ae3ac79cfa25f6cfc0c31d8ef42f3e8fd06943c2' Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Cache/Oslo::Cache[nova_config]/Nova_config[cache/tls_enabled]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[67173]: Notice: Applied catalog in 0.56 seconds Dec 3 09:09:09 np0005543227 puppet-user[67173]: Application: Dec 3 09:09:09 np0005543227 puppet-user[67173]: Initial environment: production Dec 3 09:09:09 np0005543227 puppet-user[67173]: Converged environment: production Dec 3 09:09:09 np0005543227 puppet-user[67173]: Run mode: user Dec 3 09:09:09 np0005543227 puppet-user[67173]: Changes: Dec 3 09:09:09 np0005543227 puppet-user[67173]: Total: 63 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Events: Dec 3 09:09:09 np0005543227 puppet-user[67173]: Success: 63 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Total: 63 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Resources: Dec 3 09:09:09 np0005543227 puppet-user[67173]: Skipped: 31 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Changed: 63 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Out of sync: 63 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Total: 208 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Time: Dec 3 09:09:09 np0005543227 puppet-user[67173]: Concat file: 0.00 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Anchor: 0.00 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Concat fragment: 0.00 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Augeas: 0.02 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Package: 0.03 Dec 3 09:09:09 np0005543227 puppet-user[67173]: File: 0.11 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Placement config: 0.20 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Transaction evaluation: 0.55 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Catalog application: 0.56 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Config retrieval: 1.40 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Last run: 1764752949 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Total: 0.56 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Version: Dec 3 09:09:09 np0005543227 puppet-user[67173]: Config: 1764752947 Dec 3 09:09:09 np0005543227 puppet-user[67173]: Puppet: 7.10.0 Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_in_pthread]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/heartbeat_timeout_threshold]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_scope]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Oslo::Messaging::Rabbit[nova_config]/Nova_config[oslo_messaging_rabbit/ssl]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/enforce_new_defaults]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Policy/Oslo::Policy[nova_config]/Nova_config[oslo_policy/policy_file]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Api/Oslo::Middleware[nova_config]/Nova_config[oslo_middleware/enable_proxy_headers_parsing]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Cron::Archive_deleted_rows/Cron[nova-manage db archive_deleted_rows]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Cron::Purge_shadow_tables/Cron[nova-manage db purge]/ensure: created Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:09 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:10 np0005543227 puppet-user[66315]: Notice: /Stage[main]/Nova::Wsgi::Apache_api/Openstacklib::Wsgi::Apache[nova_api_wsgi]/Apache::Vhost[nova_api_wsgi]/Concat[10-nova_api_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_api_wsgi.conf]/ensure: defined content as '{sha256}faeb0a2398559118a81582fe5dfb0d66ab2b85fea276a3c74e54f07fdaaf1740' Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Oslo::Messaging::Default[nova_config]/Nova_config[DEFAULT/transport_url]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66315]: Notice: Applied catalog in 3.62 seconds Dec 3 09:09:10 np0005543227 puppet-user[66315]: Application: Dec 3 09:09:10 np0005543227 puppet-user[66315]: Initial environment: production Dec 3 09:09:10 np0005543227 puppet-user[66315]: Converged environment: production Dec 3 09:09:10 np0005543227 puppet-user[66315]: Run mode: user Dec 3 09:09:10 np0005543227 puppet-user[66315]: Changes: Dec 3 09:09:10 np0005543227 puppet-user[66315]: Total: 156 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Events: Dec 3 09:09:10 np0005543227 puppet-user[66315]: Success: 156 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Total: 156 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Resources: Dec 3 09:09:10 np0005543227 puppet-user[66315]: Changed: 156 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Out of sync: 156 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Skipped: 45 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Total: 511 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Time: Dec 3 09:09:10 np0005543227 puppet-user[66315]: Concat file: 0.00 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Anchor: 0.00 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Concat fragment: 0.00 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Augeas: 0.01 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Package: 0.03 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Cron: 0.05 Dec 3 09:09:10 np0005543227 puppet-user[66315]: File: 0.10 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Config retrieval: 1.84 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Last run: 1764752950 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Nova config: 3.10 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Transaction evaluation: 3.61 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Catalog application: 3.62 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Resources: 0.00 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Total: 3.63 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Version: Dec 3 09:09:10 np0005543227 puppet-user[66315]: Config: 1764752944 Dec 3 09:09:10 np0005543227 puppet-user[66315]: Puppet: 7.10.0 Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/driver]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Oslo::Messaging::Notifications[nova_config]/Nova_config[oslo_messaging_notifications/transport_url]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova/Oslo::Concurrency[nova_config]/Nova_config[oslo_concurrency/lock_path]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_type]/ensure: created Dec 3 09:09:10 np0005543227 systemd[1]: libpod-e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171.scope: Deactivated successfully. Dec 3 09:09:10 np0005543227 systemd[1]: libpod-e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171.scope: Consumed 3.892s CPU time. Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/region_name]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/auth_url]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/username]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/password]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/user_domain_name]/ensure: created Dec 3 09:09:10 np0005543227 podman[68029]: 2025-12-03 09:09:10.152451037 +0000 UTC m=+0.043659935 container died e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-placement-api-container, name=rhosp17/openstack-placement-api, version=17.1.12, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.expose-services=, release=1761123044, url=https://www.redhat.com, tcib_managed=true, managed_by=tripleo_ansible, build-date=2025-11-18T23:41:26Z, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 placement-api, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, container_name=container-puppet-placement, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, config_id=tripleo_puppet_step1, description=Red Hat OpenStack Platform 17.1 placement-api, vendor=Red Hat, Inc., batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream) Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_name]/ensure: created Dec 3 09:09:10 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/project_domain_name]/ensure: created Dec 3 09:09:10 np0005543227 systemd[1]: var-lib-containers-storage-overlay-d71f6ce6c2f6faae91c6d022364e0d09f5f11e58e26162ab2282e50c5afcd40d-merged.mount: Deactivated successfully. Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Service_user/Keystone::Resource::Service_user[nova_config]/Nova_config[service_user/send_service_user_token]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:10 np0005543227 podman[68029]: 2025-12-03 09:09:10.224236177 +0000 UTC m=+0.115445035 container cleanup e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171 (image=registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1, name=container-puppet-placement, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 placement-api, org.opencontainers.image.revision=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, container_name=container-puppet-placement, io.openshift.expose-services=, vendor=Red Hat, Inc., batch=17.1_20251118.1, version=17.1.12, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, architecture=x86_64, release=1761123044, url=https://www.redhat.com, com.redhat.component=openstack-placement-api-container, summary=Red Hat OpenStack Platform 17.1 placement-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 placement-api, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-placement-api, vcs-ref=5714445d3136fb8f8cd5e0726e4e3e709c68ad0d, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 placement-api, name=rhosp17/openstack-placement-api, managed_by=tripleo_ansible, build-date=2025-11-18T23:41:26Z, config_id=tripleo_puppet_step1) Dec 3 09:09:10 np0005543227 systemd[1]: libpod-conmon-e2289350d1faabfe7acd98fd218a125674fa0c7a74641ef0a6035b973df27171.scope: Deactivated successfully. Dec 3 09:09:10 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-placement --conmon-pidfile /run/container-puppet-placement.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,placement_config --env NAME=placement --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::placement::api --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-placement --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,placement_config', 'NAME': 'placement', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::placement::api'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-placement.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-placement-api:17.1 Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_type]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[67694]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:10 np0005543227 puppet-user[67694]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:10 np0005543227 puppet-user[67694]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:10 np0005543227 puppet-user[67694]: (file & line not available) Dec 3 09:09:10 np0005543227 puppet-user[67694]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:10 np0005543227 puppet-user[67694]: (file & line not available) Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcache_use_advanced_pool]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/memcached_servers]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/region_name]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/auth_url]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/username]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/password]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/user_domain_name]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_name]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/project_domain_name]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[67694]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.31 seconds Dec 3 09:09:10 np0005543227 podman[68184]: 2025-12-03 09:09:10.564779562 +0000 UTC m=+0.065730215 container create 8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, container_name=container-puppet-swift, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, distribution-scope=public, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, vcs-type=git, managed_by=tripleo_ansible, com.redhat.component=openstack-swift-proxy-server-container, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.expose-services=, build-date=2025-11-19T00:12:50Z, vendor=Red Hat, Inc., io.buildah.version=1.41.4, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20251118.1, url=https://www.redhat.com, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server) Dec 3 09:09:10 np0005543227 puppet-user[67804]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:10 np0005543227 puppet-user[67804]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:10 np0005543227 puppet-user[67804]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:10 np0005543227 puppet-user[67804]: (file & line not available) Dec 3 09:09:10 np0005543227 puppet-user[67804]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:10 np0005543227 puppet-user[67804]: (file & line not available) Dec 3 09:09:10 np0005543227 systemd[1]: Started libpod-conmon-8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f.scope. Dec 3 09:09:10 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Keystone::Authtoken/Keystone::Resource::Authtoken[nova_config]/Nova_config[keystone_authtoken/interface]/ensure: created Dec 3 09:09:10 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/f45189366731ac4162a8eea23c648ee04e727f36b22e198d836044b1f201dcac/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:10 np0005543227 podman[68184]: 2025-12-03 09:09:10.529433614 +0000 UTC m=+0.030384287 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 09:09:10 np0005543227 podman[68184]: 2025-12-03 09:09:10.640563045 +0000 UTC m=+0.141513738 container init 8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, tcib_managed=true, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, release=1761123044, maintainer=OpenStack TripleO Team, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-swift-proxy-server, distribution-scope=public, config_id=tripleo_puppet_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, version=17.1.12, container_name=container-puppet-swift, com.redhat.component=openstack-swift-proxy-server-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-19T00:12:50Z, vendor=Red Hat, Inc., managed_by=tripleo_ansible, batch=17.1_20251118.1, io.buildah.version=1.41.4, io.openshift.expose-services=) Dec 3 09:09:10 np0005543227 podman[68184]: 2025-12-03 09:09:10.646235809 +0000 UTC m=+0.147186512 container start 8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, container_name=container-puppet-swift, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, build-date=2025-11-19T00:12:50Z, version=17.1.12, batch=17.1_20251118.1, com.redhat.component=openstack-swift-proxy-server-container, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, tcib_managed=true, io.openshift.expose-services=, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, distribution-scope=public, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, name=rhosp17/openstack-swift-proxy-server, managed_by=tripleo_ansible, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-type=git, config_id=tripleo_puppet_step1) Dec 3 09:09:10 np0005543227 podman[68184]: 2025-12-03 09:09:10.646455917 +0000 UTC m=+0.147406610 container attach 8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, vcs-type=git, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, build-date=2025-11-19T00:12:50Z, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, io.buildah.version=1.41.4, name=rhosp17/openstack-swift-proxy-server, version=17.1.12, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, managed_by=tripleo_ansible, architecture=x86_64, url=https://www.redhat.com, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift, com.redhat.component=openstack-swift-proxy-server-container, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_puppet_step1, release=1761123044, batch=17.1_20251118.1, vcs-ref=954196d89045e2492b9d148629fc509244e8701f) Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/connection]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/max_retries]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[67694]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Database::Redis_bundle/File[/etc/redis-tls.conf]/ensure: defined content as '{sha256}7102dc2ae89f130cae52d04b157ad9be2ba3f4b265e97d9e948b33755ee3ac1b' Dec 3 09:09:10 np0005543227 puppet-user[67694]: Notice: /Stage[main]/Tripleo::Stunnel/Concat[/etc/stunnel/stunnel.conf]/File[/etc/stunnel/stunnel.conf]/ensure: defined content as '{sha256}a7e9c69bc07de77e7a0308c1aed280e1274a5e57809f2b0fa7e4a703434bb459' Dec 3 09:09:10 np0005543227 puppet-user[67694]: Notice: /Stage[main]/Redis::Config/File[/etc/redis]/mode: mode changed '0750' to '0755' Dec 3 09:09:10 np0005543227 puppet-user[67694]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/security/limits.d/redis.conf]/ensure: defined content as '{sha256}4723daf91256d1c55ef938214e69b3359209d2df79c3dceb8b8352faf4c8886d' Dec 3 09:09:10 np0005543227 puppet-user[67694]: Notice: /Stage[main]/Redis::Ulimit/File[/etc/systemd/system/redis.service.d/limit.conf]/mode: mode changed '0644' to '0444' Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Db/Oslo::Db[nova_config]/Nova_config[database/db_max_retries]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[67694]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/File[/etc/redis.conf.puppet]/ensure: defined content as '{sha256}e5545f66c17b370e1ba8eeca39ac196b5929c535f8267dad088b6f3ed11dbd11' Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Db/Oslo::Db[api_database]/Nova_config[api_database/connection]/ensure: created Dec 3 09:09:10 np0005543227 puppet-user[67694]: Notice: /Stage[main]/Redis::Config/Redis::Instance[default]/Exec[cp -p /etc/redis.conf.puppet /etc/redis.conf]: Triggered 'refresh' from 1 event Dec 3 09:09:10 np0005543227 puppet-user[67694]: Notice: Applied catalog in 0.18 seconds Dec 3 09:09:10 np0005543227 puppet-user[67694]: Application: Dec 3 09:09:10 np0005543227 puppet-user[67694]: Initial environment: production Dec 3 09:09:10 np0005543227 puppet-user[67694]: Converged environment: production Dec 3 09:09:10 np0005543227 puppet-user[67694]: Run mode: user Dec 3 09:09:10 np0005543227 puppet-user[67694]: Changes: Dec 3 09:09:10 np0005543227 puppet-user[67694]: Total: 7 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Events: Dec 3 09:09:10 np0005543227 puppet-user[67694]: Success: 7 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Total: 7 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Resources: Dec 3 09:09:10 np0005543227 puppet-user[67694]: Restarted: 1 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Changed: 7 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Out of sync: 7 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Skipped: 9 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Total: 25 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Time: Dec 3 09:09:10 np0005543227 puppet-user[67694]: Concat file: 0.00 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Exec: 0.00 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Concat fragment: 0.00 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Augeas: 0.02 Dec 3 09:09:10 np0005543227 puppet-user[67694]: File: 0.10 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Transaction evaluation: 0.17 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Catalog application: 0.18 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Config retrieval: 0.44 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Last run: 1764752950 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Total: 0.18 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Version: Dec 3 09:09:10 np0005543227 puppet-user[67694]: Config: 1764752950 Dec 3 09:09:10 np0005543227 puppet-user[67694]: Puppet: 7.10.0 Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[/var/www/cgi-bin/nova]/ensure: created Dec 3 09:09:10 np0005543227 systemd[1]: libpod-e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16.scope: Deactivated successfully. Dec 3 09:09:10 np0005543227 systemd[1]: libpod-e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16.scope: Consumed 8.052s CPU time. Dec 3 09:09:10 np0005543227 puppet-user[67804]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.41 seconds Dec 3 09:09:10 np0005543227 podman[66279]: 2025-12-03 09:09:10.961170526 +0000 UTC m=+8.409461743 container died e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, maintainer=OpenStack TripleO Team, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, batch=17.1_20251118.1, release=1761123044, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, config_id=tripleo_puppet_step1, build-date=2025-11-19T00:34:57Z, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, com.redhat.component=openstack-nova-api-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.buildah.version=1.41.4, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, url=https://www.redhat.com, container_name=container-puppet-nova, name=rhosp17/openstack-nova-api, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api) Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/File[nova_metadata_wsgi]/ensure: defined content as '{sha256}7311c9047eec89f1e952197038ebb53e3ab5810905e7292a2f802c7e4fc0351c' Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Setenvif/File[setenvif.conf]/ensure: defined content as '{sha256}3906459aafe799c09305ffbfe0105de3fb9d05a4636cd93e6af9f82e10c8788b' Dec 3 09:09:10 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache::Mod::Setenvif/Apache::Mod[setenvif]/File[setenvif.load]/ensure: defined content as '{sha256}736d628e01f143a2d94f46af14446fe584d90a1a5dc68a9153e5c676f5888b15' Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/10-wsgi-python3.conf]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: /Stage[main]/Nova::Wsgi::Apache_metadata/Openstacklib::Wsgi::Apache[nova_metadata_wsgi]/Apache::Vhost[nova_metadata_wsgi]/Concat[10-nova_metadata_wsgi.conf]/File[/etc/httpd/conf.d/10-nova_metadata_wsgi.conf]/ensure: defined content as '{sha256}208d6583e08408bdfb6dc2841858301f3df306a0fdf38edbdebed4f35a20618a' Dec 3 09:09:11 np0005543227 puppet-user[66759]: Notice: Applied catalog in 3.01 seconds Dec 3 09:09:11 np0005543227 puppet-user[66759]: Application: Dec 3 09:09:11 np0005543227 puppet-user[66759]: Initial environment: production Dec 3 09:09:11 np0005543227 puppet-user[66759]: Converged environment: production Dec 3 09:09:11 np0005543227 puppet-user[66759]: Run mode: user Dec 3 09:09:11 np0005543227 puppet-user[66759]: Changes: Dec 3 09:09:11 np0005543227 puppet-user[66759]: Total: 126 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Events: Dec 3 09:09:11 np0005543227 puppet-user[66759]: Success: 126 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Total: 126 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Resources: Dec 3 09:09:11 np0005543227 puppet-user[66759]: Changed: 126 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Out of sync: 126 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Skipped: 37 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Total: 421 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Time: Dec 3 09:09:11 np0005543227 puppet-user[66759]: Anchor: 0.00 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Concat file: 0.00 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Concat fragment: 0.00 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Augeas: 0.02 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Package: 0.04 Dec 3 09:09:11 np0005543227 puppet-user[66759]: File: 0.16 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Config retrieval: 1.92 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Last run: 1764752951 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Nova config: 2.51 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Transaction evaluation: 2.99 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Catalog application: 3.01 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Resources: 0.00 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Total: 3.01 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Version: Dec 3 09:09:11 np0005543227 puppet-user[66759]: Config: 1764752946 Dec 3 09:09:11 np0005543227 puppet-user[66759]: Puppet: 7.10.0 Dec 3 09:09:11 np0005543227 podman[68282]: 2025-12-03 09:09:11.077387954 +0000 UTC m=+0.108613124 container cleanup e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16 (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova, io.buildah.version=1.41.4, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-nova-api, distribution-scope=public, config_id=tripleo_puppet_step1, container_name=container-puppet-nova, version=17.1.12, description=Red Hat OpenStack Platform 17.1 nova-api, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, architecture=x86_64, vendor=Red Hat, Inc., build-date=2025-11-19T00:34:57Z, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, release=1761123044, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.component=openstack-nova-api-container) Dec 3 09:09:11 np0005543227 systemd[1]: libpod-conmon-e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16.scope: Deactivated successfully. Dec 3 09:09:11 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova --conmon-pidfile /run/container-puppet-nova.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config --env NAME=nova --env STEP_CONFIG=include ::tripleo::packages#012['Nova_cell_v2'].each |String $val| { noop_resource($val) }#012include tripleo::profile::base::nova::api#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::conductor#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::scheduler#012include tripleo::profile::base::database::mysql::client#012include tripleo::profile::base::nova::vncproxy#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini,nova_config,nova_config,nova_config', 'NAME': 'nova', 'STEP_CONFIG': "include ::tripleo::packages\n['Nova_cell_v2'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::base::nova::api\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::conductor\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::scheduler\ninclude tripleo::profile::base::database::mysql::client\ninclude tripleo::profile::base::nova::vncproxy\ninclude tripleo::profile::base::database::mysql::client"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:11 np0005543227 puppet-user[67448]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:11 np0005543227 puppet-user[67448]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:11 np0005543227 puppet-user[67448]: (file & line not available) Dec 3 09:09:11 np0005543227 puppet-user[67804]: Notice: /Stage[main]/Rsyslog::Base/File[/etc/rsyslog.conf]/content: content changed '{sha256}d6f679f6a4eb6f33f9fc20c846cb30bef93811e1c86bc4da1946dc3100b826c3' to '{sha256}7963bd801fadd49a17561f4d3f80738c3f504b413b11c443432d8303138041f2' Dec 3 09:09:11 np0005543227 systemd[1]: var-lib-containers-storage-overlay-7fb17cae19e2b84594ef1bfa9de0de14c1e31ea73cfaef5b1f60d19a308832c0-merged.mount: Deactivated successfully. Dec 3 09:09:11 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-e627f243ae26c75bd9ca3e11bb774be1fdf5ea5a6619717265485724c0c07b16-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:11 np0005543227 puppet-user[67804]: Notice: /Stage[main]/Rsyslog::Config::Global/Rsyslog::Component::Global_config[MaxMessageSize]/Rsyslog::Generate_concat[rsyslog::concat::global_config::MaxMessageSize]/Concat[/etc/rsyslog.d/00_rsyslog.conf]/File[/etc/rsyslog.d/00_rsyslog.conf]/ensure: defined content as '{sha256}a291d5cc6d5884a978161f4c7b5831d43edd07797cc590bae366e7f150b8643b' Dec 3 09:09:11 np0005543227 puppet-user[67448]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:11 np0005543227 puppet-user[67448]: (file & line not available) Dec 3 09:09:11 np0005543227 systemd[1]: libpod-c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c.scope: Deactivated successfully. Dec 3 09:09:11 np0005543227 puppet-user[67804]: Notice: /Stage[main]/Rsyslog::Config::Templates/Rsyslog::Component::Template[rsyslog-node-index]/Rsyslog::Generate_concat[rsyslog::concat::template::rsyslog-node-index]/Concat[/etc/rsyslog.d/50_openstack_logs.conf]/File[/etc/rsyslog.d/50_openstack_logs.conf]/ensure: defined content as '{sha256}a51ffd55e67e0445ad5e84f4266d239385f2ac69f121fea0edd5f1321afb8592' Dec 3 09:09:11 np0005543227 systemd[1]: libpod-c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c.scope: Consumed 2.981s CPU time. Dec 3 09:09:11 np0005543227 podman[67642]: 2025-12-03 09:09:11.190366183 +0000 UTC m=+3.394219463 container died c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, tcib_managed=true, distribution-scope=public, architecture=x86_64, release=1761123044, description=Red Hat OpenStack Platform 17.1 redis, config_id=tripleo_puppet_step1, com.redhat.component=openstack-redis-container, summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:49:49Z, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, name=rhosp17/openstack-redis, batch=17.1_20251118.1, url=https://www.redhat.com, vcs-type=git, container_name=container-puppet-redis, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis) Dec 3 09:09:11 np0005543227 puppet-user[67804]: Notice: Applied catalog in 0.18 seconds Dec 3 09:09:11 np0005543227 puppet-user[67804]: Application: Dec 3 09:09:11 np0005543227 puppet-user[67804]: Initial environment: production Dec 3 09:09:11 np0005543227 puppet-user[67804]: Converged environment: production Dec 3 09:09:11 np0005543227 puppet-user[67804]: Run mode: user Dec 3 09:09:11 np0005543227 puppet-user[67804]: Changes: Dec 3 09:09:11 np0005543227 puppet-user[67804]: Total: 3 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Events: Dec 3 09:09:11 np0005543227 puppet-user[67804]: Success: 3 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Total: 3 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Resources: Dec 3 09:09:11 np0005543227 puppet-user[67804]: Skipped: 11 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Changed: 3 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Out of sync: 3 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Total: 45 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Time: Dec 3 09:09:11 np0005543227 puppet-user[67804]: Concat file: 0.00 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Concat fragment: 0.00 Dec 3 09:09:11 np0005543227 puppet-user[67804]: File: 0.02 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Transaction evaluation: 0.18 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Catalog application: 0.18 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Config retrieval: 0.48 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Last run: 1764752951 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Total: 0.18 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Version: Dec 3 09:09:11 np0005543227 puppet-user[67804]: Config: 1764752950 Dec 3 09:09:11 np0005543227 puppet-user[67804]: Puppet: 7.10.0 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.22 seconds Dec 3 09:09:11 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:11 np0005543227 systemd[1]: var-lib-containers-storage-overlay-7723ba5d755aa4dd3ab0201a4f0c8a96690caeabb82a48e6d77a4e64629787a8-merged.mount: Deactivated successfully. Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq]/mode: mode changed '0755' to '2755' Dec 3 09:09:11 np0005543227 podman[68394]: 2025-12-03 09:09:11.370960073 +0000 UTC m=+0.169301323 container cleanup c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=container-puppet-redis, tcib_managed=true, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, description=Red Hat OpenStack Platform 17.1 redis, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, summary=Red Hat OpenStack Platform 17.1 redis, version=17.1.12, config_id=tripleo_puppet_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, name=rhosp17/openstack-redis, com.redhat.component=openstack-redis-container, io.buildah.version=1.41.4, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, build-date=2025-11-18T22:49:49Z, distribution-scope=public, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, container_name=container-puppet-redis) Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Tripleo::Profile::Base::Rabbitmq/File[/etc/rabbitmq/ssl-dist.conf]/ensure: defined content as '{sha256}4fcb8b2c0ce7c31ae2a64808de62371e284138a67310e23f1c73dbf139a874c7' Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/rabbitmq/ssl]/ensure: created Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-env.config]/ensure: defined content as '{sha256}39ce817a59591d117f2331e71ba19515da4db7b770d118807384f8775e07a52a' Dec 3 09:09:11 np0005543227 systemd[1]: libpod-conmon-c2886d2679ddfcb4ed7943bde2f57644b45223bfdc6b645b4e8ce76c62df498c.scope: Deactivated successfully. Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq-inetrc]/ensure: defined content as '{sha256}b83b8080dbcdf2a49fff2f747972e7343801f7518a0f1dcb3e2a301e50aef551' Dec 3 09:09:11 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-redis --conmon-pidfile /run/container-puppet-redis.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,exec --env NAME=redis --env STEP_CONFIG=include ::tripleo::packages#012Exec <| title == 'systemd-reload-redis' |> { unless => 'true' }#012include tripleo::profile::pacemaker::database::redis_bundle#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-redis --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,exec', 'NAME': 'redis', 'STEP_CONFIG': "include ::tripleo::packages\nExec <| title == 'systemd-reload-redis' |> { unless => 'true' }\ninclude tripleo::profile::pacemaker::database::redis_bundle\n"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-redis.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Rabbitmq::Config/File[enabled_plugins]/ensure: defined content as '{sha256}3b5c9fba2f1456d923499fc142bc9ef7a7f6d53d6bc4c0ae88310332eb10a31c' Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Rabbitmq::Config/File[/etc/security/limits.d/rabbitmq-server.conf]/ensure: defined content as '{sha256}b984a5f0a62696715f206ca0a602fd9d2d497894c6c24502896fb3010ee0c557' Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Rabbitmq::Config/File[rabbitmq.config]/ensure: defined content as '{sha256}50eff6ad3277ed0960fe9a20abe4b717cd1de7a50d25bdbe12f882ba59102136' Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File[/var/lib/rabbitmq/.erlang.cookie]/content: content changed '{sha256}7dbfc7d05812b619d9ce6684a6204dafcf2bba7a5c1f86e4666a7a1dbee19ee8' to '{sha256}99fcff85571df09bef220d538fe3a8b2e3ea19a1b6434bc9b894584557f39b35' Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-systemd]/ensure: removed Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: /Stage[main]/Tripleo::Profile::Pacemaker::Rabbitmq_bundle/File_line[rabbitmq-pamd-succeed]/ensure: created Dec 3 09:09:11 np0005543227 puppet-user[67448]: Notice: Applied catalog in 0.11 seconds Dec 3 09:09:11 np0005543227 puppet-user[67448]: Application: Dec 3 09:09:11 np0005543227 puppet-user[67448]: Initial environment: production Dec 3 09:09:11 np0005543227 puppet-user[67448]: Converged environment: production Dec 3 09:09:11 np0005543227 puppet-user[67448]: Run mode: user Dec 3 09:09:11 np0005543227 puppet-user[67448]: Changes: Dec 3 09:09:11 np0005543227 puppet-user[67448]: Total: 11 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Events: Dec 3 09:09:11 np0005543227 puppet-user[67448]: Success: 11 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Total: 11 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Resources: Dec 3 09:09:11 np0005543227 puppet-user[67448]: Changed: 11 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Out of sync: 11 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Skipped: 9 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Total: 20 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Time: Dec 3 09:09:11 np0005543227 puppet-user[67448]: File line: 0.00 Dec 3 09:09:11 np0005543227 puppet-user[67448]: File: 0.07 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Transaction evaluation: 0.09 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Catalog application: 0.11 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Config retrieval: 0.26 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Last run: 1764752951 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Total: 0.11 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Version: Dec 3 09:09:11 np0005543227 puppet-user[67448]: Config: 1764752951 Dec 3 09:09:11 np0005543227 puppet-user[67448]: Puppet: 7.10.0 Dec 3 09:09:11 np0005543227 systemd[1]: libpod-b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197.scope: Deactivated successfully. Dec 3 09:09:11 np0005543227 systemd[1]: libpod-b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197.scope: Consumed 2.638s CPU time. Dec 3 09:09:11 np0005543227 podman[67774]: 2025-12-03 09:09:11.571036763 +0000 UTC m=+3.013934234 container died b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, container_name=container-puppet-rsyslog, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:49Z, version=17.1.12, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-rsyslog-container, batch=17.1_20251118.1, vcs-type=git, config_id=tripleo_puppet_step1, io.openshift.expose-services=, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.buildah.version=1.41.4, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 rsyslog, url=https://www.redhat.com, tcib_managed=true, name=rhosp17/openstack-rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:11 np0005543227 podman[68484]: 2025-12-03 09:09:11.552659217 +0000 UTC m=+0.030430238 image pull registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 09:09:11 np0005543227 podman[68484]: 2025-12-03 09:09:11.662751496 +0000 UTC m=+0.140522547 container create 709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, release=1761123044, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, tcib_managed=true, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, version=17.1.12, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, vendor=Red Hat, Inc., build-date=2025-11-19T00:12:50Z, container_name=container-puppet-swift_ringbuilder, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-swift-proxy-server-container, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, name=rhosp17/openstack-swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, io.buildah.version=1.41.4, vcs-ref=954196d89045e2492b9d148629fc509244e8701f) Dec 3 09:09:11 np0005543227 systemd[1]: Started libpod-conmon-709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e.scope. Dec 3 09:09:11 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:11 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/772c0faefe485f35fdcfface5f40911c7828aa57f7899fd556260f244905de2f/merged/var/lib/config-data supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:11 np0005543227 systemd[1]: libpod-6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f.scope: Deactivated successfully. Dec 3 09:09:11 np0005543227 systemd[1]: libpod-6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f.scope: Consumed 5.304s CPU time. Dec 3 09:09:11 np0005543227 podman[68484]: 2025-12-03 09:09:11.850032772 +0000 UTC m=+0.327803843 container init 709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, managed_by=tripleo_ansible, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, url=https://www.redhat.com, tcib_managed=true, config_id=tripleo_puppet_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, maintainer=OpenStack TripleO Team, distribution-scope=public, vcs-type=git, name=rhosp17/openstack-swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., build-date=2025-11-19T00:12:50Z, io.buildah.version=1.41.4, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, com.redhat.component=openstack-swift-proxy-server-container, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.openshift.expose-services=) Dec 3 09:09:11 np0005543227 podman[68484]: 2025-12-03 09:09:11.857964527 +0000 UTC m=+0.335735548 container start 709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, container_name=container-puppet-swift_ringbuilder, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, tcib_managed=true, config_id=tripleo_puppet_step1, batch=17.1_20251118.1, build-date=2025-11-19T00:12:50Z, io.buildah.version=1.41.4, architecture=x86_64, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1761123044, com.redhat.component=openstack-swift-proxy-server-container, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, name=rhosp17/openstack-swift-proxy-server, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, version=17.1.12, vcs-type=git, io.openshift.expose-services=) Dec 3 09:09:11 np0005543227 podman[68484]: 2025-12-03 09:09:11.858238155 +0000 UTC m=+0.336009186 container attach 709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, container_name=container-puppet-swift_ringbuilder, io.openshift.expose-services=, maintainer=OpenStack TripleO Team, version=17.1.12, com.redhat.component=openstack-swift-proxy-server-container, name=rhosp17/openstack-swift-proxy-server, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, vcs-type=git, build-date=2025-11-19T00:12:50Z, release=1761123044, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, vendor=Red Hat, Inc., url=https://www.redhat.com, io.buildah.version=1.41.4, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, batch=17.1_20251118.1) Dec 3 09:09:11 np0005543227 podman[67355]: 2025-12-03 09:09:11.907648347 +0000 UTC m=+5.075536118 container died 6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=container-puppet-rabbitmq, tcib_managed=true, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.expose-services=, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 rabbitmq, name=rhosp17/openstack-rabbitmq, vendor=Red Hat, Inc., release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-rabbitmq-container, io.buildah.version=1.41.4, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:49:50Z, description=Red Hat OpenStack Platform 17.1 rabbitmq, batch=17.1_20251118.1) Dec 3 09:09:11 np0005543227 podman[68522]: 2025-12-03 09:09:11.963652311 +0000 UTC m=+0.382352254 container cleanup b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197 (image=registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1, name=container-puppet-rsyslog, build-date=2025-11-18T22:49:49Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-rsyslog-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, url=https://www.redhat.com, io.openshift.expose-services=, distribution-scope=public, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rsyslog, vcs-type=git, tcib_managed=true, container_name=container-puppet-rsyslog, description=Red Hat OpenStack Platform 17.1 rsyslog, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rsyslog, summary=Red Hat OpenStack Platform 17.1 rsyslog, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_puppet_step1, version=17.1.12, managed_by=tripleo_ansible, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, io.k8s.description=Red Hat OpenStack Platform 17.1 rsyslog, vendor=Red Hat, Inc., name=rhosp17/openstack-rsyslog) Dec 3 09:09:11 np0005543227 systemd[1]: libpod-fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b.scope: Deactivated successfully. Dec 3 09:09:11 np0005543227 systemd[1]: libpod-fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b.scope: Consumed 7.568s CPU time. Dec 3 09:09:11 np0005543227 podman[66697]: 2025-12-03 09:09:11.967408456 +0000 UTC m=+8.120105833 container died fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, managed_by=tripleo_ansible, release=1761123044, build-date=2025-11-19T00:34:57Z, io.buildah.version=1.41.4, url=https://www.redhat.com, distribution-scope=public, batch=17.1_20251118.1, com.redhat.component=openstack-nova-api-container, name=rhosp17/openstack-nova-api, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 nova-api, config_id=tripleo_puppet_step1, io.openshift.expose-services=, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 nova-api, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=container-puppet-nova_metadata, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api) Dec 3 09:09:11 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rsyslog --conmon-pidfile /run/container-puppet-rsyslog.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment --env NAME=rsyslog --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::logging::rsyslog --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rsyslog --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,rsyslog::generate_concat,concat::fragment', 'NAME': 'rsyslog', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::logging::rsyslog'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rsyslog.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rsyslog:17.1 Dec 3 09:09:11 np0005543227 systemd[1]: libpod-conmon-b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197.scope: Deactivated successfully. Dec 3 09:09:12 np0005543227 podman[68629]: 2025-12-03 09:09:12.035729139 +0000 UTC m=+0.058943945 container cleanup fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b (image=registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1, name=container-puppet-nova_metadata, vendor=Red Hat, Inc., version=17.1.12, url=https://www.redhat.com, vcs-type=git, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, tcib_managed=true, config_id=tripleo_puppet_step1, com.redhat.component=openstack-nova-api-container, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vcs-ref=d13aeaae6d02e9d9273775f1920879be7af2cf2d, build-date=2025-11-19T00:34:57Z, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-nova-api, summary=Red Hat OpenStack Platform 17.1 nova-api, description=Red Hat OpenStack Platform 17.1 nova-api, org.opencontainers.image.revision=d13aeaae6d02e9d9273775f1920879be7af2cf2d, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 nova-api, name=rhosp17/openstack-nova-api, container_name=container-puppet-nova_metadata, io.k8s.description=Red Hat OpenStack Platform 17.1 nova-api) Dec 3 09:09:12 np0005543227 systemd[1]: libpod-conmon-fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b.scope: Deactivated successfully. Dec 3 09:09:12 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-nova_metadata --conmon-pidfile /run/container-puppet-nova_metadata.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini --env NAME=nova_metadata --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::nova::metadata#012include tripleo::profile::base::database::mysql::client --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-nova_metadata --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,nova_config,nova_api_paste_ini', 'NAME': 'nova_metadata', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::nova::metadata\ninclude tripleo::profile::base::database::mysql::client'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-nova_metadata.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-nova-api:17.1 Dec 3 09:09:12 np0005543227 podman[68596]: 2025-12-03 09:09:12.066054253 +0000 UTC m=+0.197545042 container cleanup 6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=container-puppet-rabbitmq, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, vendor=Red Hat, Inc., cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, konflux.additional-tags=17.1.12 17.1_20251118.1, container_name=container-puppet-rabbitmq, url=https://www.redhat.com, batch=17.1_20251118.1, version=17.1.12, managed_by=tripleo_ansible, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, name=rhosp17/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, distribution-scope=public, build-date=2025-11-18T22:49:50Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-rabbitmq-container, summary=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.buildah.version=1.41.4, release=1761123044, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, tcib_managed=true) Dec 3 09:09:12 np0005543227 systemd[1]: libpod-conmon-6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f.scope: Deactivated successfully. Dec 3 09:09:12 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-rabbitmq --conmon-pidfile /run/container-puppet-rabbitmq.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,file,file_line --env NAME=rabbitmq --env STEP_CONFIG=include ::tripleo::packages#012['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }#012include tripleo::profile::pacemaker::rabbitmq_bundle --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-rabbitmq --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,file,file_line', 'NAME': 'rabbitmq', 'STEP_CONFIG': "include ::tripleo::packages\n['Rabbitmq_policy', 'Rabbitmq_user'].each |String $val| { noop_resource($val) }\ninclude tripleo::profile::pacemaker::rabbitmq_bundle"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-rabbitmq.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 09:09:12 np0005543227 systemd[1]: var-lib-containers-storage-overlay-c3c8e78bcd86d907edecbc2c64174e2ea0237dce8ccb0c7958ca2eb3b2fa2c12-merged.mount: Deactivated successfully. Dec 3 09:09:12 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-b599993c33cbcbb63f7bccc988a119eab9293e783cbb8c17b9ce6cbd22965197-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:12 np0005543227 systemd[1]: var-lib-containers-storage-overlay-bea85bc39f6c03edd71bbc9b891cfeaad4a3521e24126b1bc202eed69ee102fb-merged.mount: Deactivated successfully. Dec 3 09:09:12 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-6f218ad974745cbae5c0853cfd17e7f756fb886ab1b239a721626cd0f7a9f44f-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:12 np0005543227 systemd[1]: var-lib-containers-storage-overlay-0e2016414c93ca8e306aaaac5ac7ac8fa08c9573c80346e069951f1f15984390-merged.mount: Deactivated successfully. Dec 3 09:09:12 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-fcdebeca620ffbc1114efdc492ee0a0e84486c04f9fa31d923c11deaa3fc456b-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:12 np0005543227 puppet-user[68266]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:12 np0005543227 puppet-user[68266]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:12 np0005543227 puppet-user[68266]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:12 np0005543227 puppet-user[68266]: (file & line not available) Dec 3 09:09:12 np0005543227 puppet-user[68266]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:12 np0005543227 puppet-user[68266]: (file & line not available) Dec 3 09:09:13 np0005543227 puppet-user[68266]: Warning: Scope(Class[Swift::Proxy::S3token]): Usage of the default password is deprecated and will be removed in a future release. \ Dec 3 09:09:13 np0005543227 puppet-user[68266]: Please set password parameter Dec 3 09:09:13 np0005543227 puppet-user[68266]: Warning: Scope(Class[Swift::Keymaster]): password parameter is missing Dec 3 09:09:13 np0005543227 puppet-user[68266]: Warning: Scope(Class[Swift::Storage::All]): The default port for the object storage server has changed \ Dec 3 09:09:13 np0005543227 puppet-user[68266]: from 6000 to 6200 and will be changed in a later release Dec 3 09:09:13 np0005543227 puppet-user[68266]: Warning: Scope(Class[Swift::Storage::All]): The default port for the container storage server has changed \ Dec 3 09:09:13 np0005543227 puppet-user[68266]: from 6001 to 6201 and will be changed in a later release Dec 3 09:09:13 np0005543227 puppet-user[68266]: Warning: Scope(Class[Swift::Storage::All]): The default port for the account storage server has changed \ Dec 3 09:09:13 np0005543227 puppet-user[68266]: from 6002 to 6202 and will be changed in a later release Dec 3 09:09:13 np0005543227 puppet-user[68266]: Warning: Scope(Apache::Vhost[swift-proxy-api-proxy]): Dec 3 09:09:13 np0005543227 puppet-user[68266]: It is possible for the $name parameter to be defined with spaces in it. Although supported on POSIX systems, this Dec 3 09:09:13 np0005543227 puppet-user[68266]: can lead to cumbersome file names. The $servername attribute has stricter conditions from Apache (i.e. no spaces) Dec 3 09:09:13 np0005543227 puppet-user[68266]: When $use_servername_for_filenames = true, the $servername parameter, sanitized, is used to construct log and config Dec 3 09:09:13 np0005543227 puppet-user[68266]: file names. Dec 3 09:09:13 np0005543227 puppet-user[68266]: Dec 3 09:09:13 np0005543227 puppet-user[68266]: From version v7.0.0 of the puppetlabs-apache module, this parameter will default to true. From version v8.0.0 of the Dec 3 09:09:13 np0005543227 puppet-user[68266]: module, the $use_servername_for_filenames will be removed and log/config file names will be derived from the Dec 3 09:09:13 np0005543227 puppet-user[68266]: sanitized $servername parameter when not explicitly defined. Dec 3 09:09:13 np0005543227 puppet-user[68618]: Warning: /etc/puppet/hiera.yaml: Use of 'hiera.yaml' version 3 is deprecated. It should be converted to version 5 Dec 3 09:09:13 np0005543227 puppet-user[68618]: (file: /etc/puppet/hiera.yaml) Dec 3 09:09:13 np0005543227 puppet-user[68618]: Warning: Undefined variable '::deploy_config_name'; Dec 3 09:09:13 np0005543227 puppet-user[68618]: (file & line not available) Dec 3 09:09:13 np0005543227 puppet-user[68618]: Warning: The function 'hiera' is deprecated in favor of using 'lookup'. See https://puppet.com/docs/puppet/7.10/deprecated_language.html Dec 3 09:09:13 np0005543227 puppet-user[68618]: (file & line not available) Dec 3 09:09:13 np0005543227 puppet-user[68266]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 1.19 seconds Dec 3 09:09:13 np0005543227 puppet-user[68618]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Dec 3 09:09:13 np0005543227 puppet-user[68618]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Dec 3 09:09:13 np0005543227 puppet-user[68618]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Dec 3 09:09:13 np0005543227 puppet-user[68618]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Dec 3 09:09:13 np0005543227 puppet-user[68618]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 13) Dec 3 09:09:13 np0005543227 puppet-user[68618]: Warning: The string '1' was automatically coerced to the numerical value 1 (file: /etc/puppet/modules/tripleo/manifests/profile/base/swift/add_devices.pp, line: 39, column: 25) Dec 3 09:09:14 np0005543227 puppet-user[68618]: Warning: validate_legacy(validate_re) expects an Integer value, got String at ["/etc/puppet/modules/swift/manifests/ringbuilder/rebalance.pp", 23]: Dec 3 09:09:14 np0005543227 puppet-user[68618]: (location: /etc/puppet/modules/stdlib/lib/puppet/functions/deprecation.rb:34:in `deprecation') Dec 3 09:09:14 np0005543227 puppet-user[68618]: Notice: Compiled catalog for np0005543227.ooo.test in environment production in 0.30 seconds Dec 3 09:09:14 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Dec 3 09:09:14 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Dec 3 09:09:14 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Dec 3 09:09:14 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to fKFsZIlHbmQpoGrXfErG3odhD Dec 3 09:09:14 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Prefork/File[/etc/httpd/conf.modules.d/prefork.conf]/ensure: defined content as '{sha256}3416848459dfd1bd419fb071f68b2ea5d8e6e9867a76d5341dc8d9efed0948cb' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Status/File[status.conf]/ensure: defined content as '{sha256}ab8ffe3256e845dfb6a4c5088ae25445d4344a295858a1e3c2daa88f27527d4f' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Mime/File[mime.conf]/ensure: defined content as '{sha256}847a6fcb41eb25248553082108cde5327c624189fe47009f65d11c3885cab78c' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/Concat[/etc/httpd/conf/ports.conf]/File[/etc/httpd/conf/ports.conf]/ensure: defined content as '{sha256}bfbab458fa39f61c87cdb5ef3cce52ed613f259eef800a09a1adfa39c2c5ef56' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf/httpd.conf]/content: content changed '{sha256}b8a7429cbef3ecabe9e4f331123adb372ecfa3e82e76bc33d6cce997b36874bb' to '{sha256}06c2c6b8addfeea7a67e5e329ad9a366cec9d8c91aa4e336d058fa2331bd3a0d' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[log_config]/File[log_config.load]/ensure: defined content as '{sha256}8dbb5887d99b1bd7e8e6700b2c3bcfebc3d6ce5fdb66b8504b224d99ce5981a7' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[systemd]/File[systemd.load]/ensure: defined content as '{sha256}55fd1ffb0fbb31ed1635c6175b7904207ae53c25e37a8de928aeeb6efb2f21eb' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[unixd]/File[unixd.load]/ensure: defined content as '{sha256}eb9bf7ff02774b28c59bc3cc355fe6bea4b7b1b6780453d078fb1558b2d714fd' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_host]/File[authz_host.load]/ensure: defined content as '{sha256}53f359b7deca28aff7c56ca0ac425ccb8323bc5121f64e4c5f04036898e6d866' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Default_mods/Apache::Mod[authz_core]/File[authz_core.load]/ensure: defined content as '{sha256}ca2fe478af71981984e353dd168b51c9bc993005157b9bff497c9aa7a7125700' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Filter/Apache::Mod[filter]/File[filter.load]/ensure: defined content as '{sha256}197eae5f99bc425f01e493b3390d78b186be5364d81fc5e3a6df370be3c3f734' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Prefork/Apache::Mpm[prefork]/File[/etc/httpd/conf.modules.d/prefork.load]/ensure: defined content as '{sha256}8cbdbfcf32c28d41e5ca9206eea0e3be34dce45cff3a0c408ad2d23761560052' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Status/Apache::Mod[status]/File[status.load]/ensure: defined content as '{sha256}a6ff35715035af2d397f744cbd2023805fad6fd3dd17a10d225e497fcb7ac808' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Mime/Apache::Mod[mime]/File[mime.load]/ensure: defined content as '{sha256}2086e39dec178d39012a52700badd7b3cc6f2d97c06d197807e0cad8877e5f16' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/README]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/autoindex.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/ssl.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/userdir.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.d/welcome.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Ssl/File[ssl.conf]/ensure: defined content as '{sha256}b557e3f0d80a7396fbcfe8227de71e41d3e3fc24d5a6bf757a322be7763e538f' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Ssl/Apache::Mod[ssl]/File[ssl.load]/ensure: defined content as '{sha256}88f04c415dbd1bf0d074965d37261e056d073b675a047a02e55222818640c6e8' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Socache_shmcb/Apache::Mod[socache_shmcb]/File[socache_shmcb.load]/ensure: defined content as '{sha256}9feefdc48c65f8b73ab77f3fc813d60744dc97b336bbd60e16bbd763b99c5d66' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Rsync::Server/Concat[/etc/rsyncd.conf]/File[/etc/rsyncd.conf]/content: content changed '{sha256}189b30972178b755e8e70eab81b1d261c4def61b342300f11760e6f2e706ff64' to '{sha256}c5b164d0a9b819c87d935aa2ec255d882bc2edece6478aba3b5fba7bacd99410' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Rsync::Server/Service[rsyncd]/ensure: ensure changed 0 to 'running' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Proxy/File[proxy.conf]/ensure: defined content as '{sha256}1f83fb9fdc691792f18c7eef57c351df7f581957c8cb90ee22ffbc7ff580389a' Dec 3 09:09:14 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[object]/Exec[create_object]/returns: executed successfully Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005543225.internalapi.ooo.test:11212,np0005543226.internalapi.ooo.test:11212,np0005543227.internalapi.ooo.test:11212 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:cache/tls_enabled]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[filter:proxy-logging/use]/value: value changed egg:swift#poxy_logging to egg:swift#proxy_logging Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[pipeline:main/pipeline]/value: value changed catch_errors proxy-logging cache proxy-server to catch_errors cache proxy-server Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/auto_create_account_prefix]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/concurrency]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/expiring_objects_account_name]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/interval]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/process]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/processes]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/reclaim_age]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/recon_cache_path]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/report_interval]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_facility]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Objectexpirer/Swift_object_expirer_config[object-expirer/log_level]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift/File[/var/lib/swift]/group: group changed 'root' to 'swift' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift/File[/var/run/swift]/group: group changed 'root' to 'swift' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift/File[/etc/swift/swift.conf]/owner: owner changed 'root' to 'swift' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_suffix]/value: value changed %SWIFT_HASH_PATH_SUFFIX% to fKFsZIlHbmQpoGrXfErG3odhD Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift/Swift_config[swift-hash/swift_hash_path_prefix]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift/Swift_config[swift-constraints/max_header_size]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/bind_ip]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/workers]/value: value changed 8 to 1 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_name]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_facility]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_level]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_headers]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[DEFAULT/log_address]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[pipeline:main/pipeline]/value: value changed catch_errors gatekeeper healthcheck proxy-logging cache container_sync bulk tempurl ratelimit copy container-quotas account-quotas slo dlo versioned_writes proxy-logging proxy-server to catch_errors gatekeeper healthcheck proxy-logging cache listing_formats ratelimit bulk tempurl formpost authtoken s3api s3token keystone staticweb copy container_quotas account_quotas slo dlo versioned_writes proxy-logging proxy-server Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_name]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_facility]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_level]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/set log_address]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/log_handoffs]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/object_chunk_size]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/client_chunk_size]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/allow_account_management]/value: value changed true to True Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/account_autocreate]/value: value changed true to True Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/max_containers_per_account]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/node_timeout]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy/Swift_proxy_config[app:proxy-server/recoverable_node_timeout]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_name]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_facility]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_level]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_headers]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Gatekeeper/Swift_proxy_config[filter:gatekeeper/set log_address]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_servers]/value: value changed 127.0.0.1:11211 to np0005543225.internalapi.ooo.test:11212,np0005543226.internalapi.ooo.test:11212,np0005543227.internalapi.ooo.test:11212 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/tls_enabled]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Cache/Swift_proxy_config[filter:cache/memcache_max_connections]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Listing_formats/Swift_proxy_config[filter:listing_formats/use]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/clock_accuracy]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/max_sleep_time_seconds]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/log_sleep_time_seconds]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/rate_buffer_seconds]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Ratelimit/Swift_proxy_config[filter:ratelimit/account_ratelimit]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_containers_per_extraction]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_failed_extractions]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/max_deletes_per_request]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Bulk/Swift_proxy_config[filter:bulk/yield_frequency]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Formpost/Swift_proxy_config[filter:formpost/use]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/log_name]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/www_authenticate_uri]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_url]/value: value changed http://127.0.0.1:5000 to https://overcloud.internalapi.ooo.test:5000 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/auth_type]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_domain_id]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/user_domain_id]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/project_name]/value: value changed %SERVICE_TENANT_NAME% to service Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/username]/value: value changed %SERVICE_USER% to swift Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/password]/value: value changed [old secret redacted] to [new secret redacted] Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/region_name]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/delay_auth_decision]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/cache]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/include_service_catalog]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Authtoken/Swift_proxy_config[filter:authtoken/interface]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/use]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3api/Swift_proxy_config[filter:s3api/auth_pipeline_check]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/use]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_uri]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/reseller_prefix]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/delay_auth_decision]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/secret_cache_duration]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_url]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/auth_type]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/username]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/password]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_name]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/project_domain_id]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::S3token/Swift_proxy_config[filter:s3token/user_domain_id]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/operator_roles]/value: value changed admin, SwiftOperator to admin, swiftoperator, ResellerAdmin Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/reseller_prefix]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Keystone/Swift_proxy_config[filter:keystone/system_reader_roles]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/use]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Staticweb/Swift_proxy_config[filter:staticweb/url_base]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Copy/Swift_proxy_config[filter:copy/object_post_as_copy]/value: value changed false to True Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Container_quotas/Swift_proxy_config[filter:container_quotas/use]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Account_quotas/Swift_proxy_config[filter:account_quotas/use]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_segments]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_manifest_size]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/min_segment_size]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_after_segment]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/rate_limit_segments_per_sec]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Slo/Swift_proxy_config[filter:slo/max_get_time]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_after_segment]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/rate_limit_segments_per_sec]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Dlo/Swift_proxy_config[filter:dlo/max_get_time]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Versioned_writes/Swift_proxy_config[filter:versioned_writes/allow_versioned_writes]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/use]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Kms_keymaster/Swift_proxy_config[filter:kms_keymaster/keymaster_config_path]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/use]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Proxy::Encryption/Swift_proxy_config[filter:encryption/disable_encryption]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/api_class]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/username]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_name]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/project_domain_id]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/user_domain_id]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Keymaster/Swift_keymaster_config[kms_keymaster/meta_version_to_write]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Storage/File[/srv/node/d1]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Storage::Account/Swift::Storage::Generic[account]/File[/etc/swift/account-server/]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Storage::Container/Swift::Storage::Generic[container]/File[/etc/swift/container-server/]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Storage::Object/Swift::Storage::Generic[object]/File[/etc/swift/object-server/]/ensure: created Dec 3 09:09:14 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[account]/Exec[create_account]/returns: executed successfully Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6002]/Concat[/etc/swift/account-server.conf]/File[/etc/swift/account-server.conf]/ensure: defined content as '{sha256}c425dc1a3557dff51856e8dfa3150ddbf3c4d9fbf9af3af44077db6b3096c6c3' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6001]/Concat[/etc/swift/container-server.conf]/File[/etc/swift/container-server.conf]/ensure: defined content as '{sha256}56dc59297a840150603492e7684ddc18e526fb065aa512d3eb8d07431e2da61a' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Swift::Storage::All/Swift::Storage::Server[6000]/Concat[/etc/swift/object-server.conf]/File[/etc/swift/object-server.conf]/ensure: defined content as '{sha256}efccc9f8da8344e5287955af9b8172164d6a5a7eff5026081d6a970082011262' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Proxy/Apache::Mod[proxy]/File[proxy.load]/ensure: defined content as '{sha256}2511d6ea64c0f253b219670c445ed4f403f94caba5fb05e0b9600f0d107e1dda' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Proxy_http/Apache::Mod[proxy_http]/File[proxy_http.load]/ensure: defined content as '{sha256}da88b8cc8564c211a609dab024b97c97ea5935c94badbf4940125f679d198781' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache::Mod::Headers/Apache::Mod[headers]/File[headers.load]/ensure: defined content as '{sha256}afb3543781a0adb6e46645cb5079509a9f1e3246c2285967df9cdf5b25fadd4f' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-base.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-brotli.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-dav.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-mpm.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-optional.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-proxy.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-ssl.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/00-systemd.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/01-cgi.conf]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Apache/File[/etc/httpd/conf.modules.d/README]/ensure: removed Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Proxy/Tripleo::Tls_proxy[swift-proxy-api]/Apache::Vhost[swift-proxy-api-proxy]/Concat[25-swift-proxy-api-proxy.conf]/File[/etc/httpd/conf.d/25-swift-proxy-api-proxy.conf]/ensure: defined content as '{sha256}a612df8869c30df8a5dbf17bd9940bee6816f5642c1221fc4bf055e88159883c' Dec 3 09:09:14 np0005543227 puppet-user[68266]: Notice: Applied catalog in 0.71 seconds Dec 3 09:09:14 np0005543227 puppet-user[68266]: Application: Dec 3 09:09:14 np0005543227 puppet-user[68266]: Initial environment: production Dec 3 09:09:14 np0005543227 puppet-user[68266]: Converged environment: production Dec 3 09:09:14 np0005543227 puppet-user[68266]: Run mode: user Dec 3 09:09:14 np0005543227 puppet-user[68266]: Changes: Dec 3 09:09:14 np0005543227 puppet-user[68266]: Total: 163 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Events: Dec 3 09:09:14 np0005543227 puppet-user[68266]: Success: 163 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Total: 163 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Resources: Dec 3 09:09:14 np0005543227 puppet-user[68266]: Changed: 163 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Out of sync: 163 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Skipped: 46 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Total: 330 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Time: Dec 3 09:09:14 np0005543227 puppet-user[68266]: Concat file: 0.00 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Service: 0.00 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Swift config: 0.00 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Concat fragment: 0.00 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Swift object expirer config: 0.01 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Swift keymaster config: 0.02 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Package: 0.03 Dec 3 09:09:14 np0005543227 puppet-user[68266]: File: 0.14 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Swift proxy config: 0.17 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Transaction evaluation: 0.70 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Catalog application: 0.71 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Config retrieval: 1.43 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Last run: 1764752954 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Resources: 0.00 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Total: 0.71 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Version: Dec 3 09:09:14 np0005543227 puppet-user[68266]: Config: 1764752952 Dec 3 09:09:14 np0005543227 puppet-user[68266]: Puppet: 7.10.0 Dec 3 09:09:15 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Create[container]/Exec[create_container]/returns: executed successfully Dec 3 09:09:15 np0005543227 puppet-user[68618]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:15 np0005543227 puppet-user[68618]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:15 np0005543227 puppet-user[68618]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Dec 3 09:09:15 np0005543227 systemd[1]: libpod-8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f.scope: Deactivated successfully. Dec 3 09:09:15 np0005543227 systemd[1]: libpod-8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f.scope: Consumed 4.459s CPU time. Dec 3 09:09:15 np0005543227 podman[68184]: 2025-12-03 09:09:15.398184804 +0000 UTC m=+4.899135497 container died 8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, architecture=x86_64, distribution-scope=public, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, release=1761123044, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, vcs-type=git, url=https://www.redhat.com, build-date=2025-11-19T00:12:50Z, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, vendor=Red Hat, Inc., tcib_managed=true, name=rhosp17/openstack-swift-proxy-server, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.expose-services=, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, com.redhat.component=openstack-swift-proxy-server-container, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server) Dec 3 09:09:15 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:15 np0005543227 systemd[1]: var-lib-containers-storage-overlay-f45189366731ac4162a8eea23c648ee04e727f36b22e198d836044b1f201dcac-merged.mount: Deactivated successfully. Dec 3 09:09:15 np0005543227 podman[68890]: 2025-12-03 09:09:15.498898805 +0000 UTC m=+0.092529960 container cleanup 8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-swift, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, tcib_managed=true, config_id=tripleo_puppet_step1, architecture=x86_64, release=1761123044, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, com.redhat.component=openstack-swift-proxy-server-container, name=rhosp17/openstack-swift-proxy-server, vcs-type=git, managed_by=tripleo_ansible, io.buildah.version=1.41.4, build-date=2025-11-19T00:12:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, version=17.1.12, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, url=https://www.redhat.com, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, maintainer=OpenStack TripleO Team) Dec 3 09:09:15 np0005543227 systemd[1]: libpod-conmon-8a1d389aacc8aee9afd0963fc5a1e7efb257cdbae9b955e9f44f1a33865b3d5f.scope: Deactivated successfully. Dec 3 09:09:15 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift --conmon-pidfile /run/container-puppet-swift.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server --env NAME=swift --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::proxy#012#012class xinetd() {}#012define xinetd::service($bind='',$port='',$server='',$server_args='') {}#012noop_resource('service')#012include tripleo::profile::base::swift::storage --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,swift_proxy_config,swift_keymaster_config,swift_config,swift_container_config,swift_container_sync_realms_config,swift_account_config,swift_object_config,swift_object_expirer_config,rsync::server', 'NAME': 'swift', 'STEP_CONFIG': "include ::tripleo::packages\ninclude tripleo::profile::base::swift::proxy\n\nclass xinetd() {}\ndefine xinetd::service($bind='',$port='',$server='',$server_args='') {}\nnoop_resource('service')\ninclude tripleo::profile::base::swift::storage"}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 09:09:15 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_object_device[172.20.0.103:6000/d1]/ensure: created Dec 3 09:09:15 np0005543227 puppet-user[68618]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:15 np0005543227 puppet-user[68618]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:15 np0005543227 puppet-user[68618]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Dec 3 09:09:16 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_container_device[172.20.0.103:6001/d1]/ensure: created Dec 3 09:09:16 np0005543227 puppet-user[68618]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:16 np0005543227 puppet-user[68618]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:16 np0005543227 puppet-user[68618]: Warning: Unexpected line: There are no devices in this ring, or all devices have been deleted Dec 3 09:09:16 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.103:%PORT%/d1]/Ring_account_device[172.20.0.103:6002/d1]/ensure: created Dec 3 09:09:17 np0005543227 puppet-user[68618]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:17 np0005543227 puppet-user[68618]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:17 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_object_device[172.20.0.104:6000/d1]/ensure: created Dec 3 09:09:17 np0005543227 puppet-user[68618]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:17 np0005543227 puppet-user[68618]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:17 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_container_device[172.20.0.104:6001/d1]/ensure: created Dec 3 09:09:18 np0005543227 puppet-user[68618]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:18 np0005543227 puppet-user[68618]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:18 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.104:%PORT%/d1]/Ring_account_device[172.20.0.104:6002/d1]/ensure: created Dec 3 09:09:18 np0005543227 puppet-user[68618]: Warning: Unexpected line: Ring file /etc/swift/object.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:18 np0005543227 puppet-user[68618]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:19 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_object_device[172.20.0.105:6000/d1]/ensure: created Dec 3 09:09:19 np0005543227 puppet-user[68618]: Warning: Unexpected line: Ring file /etc/swift/container.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:19 np0005543227 puppet-user[68618]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:19 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_container_device[172.20.0.105:6001/d1]/ensure: created Dec 3 09:09:20 np0005543227 puppet-user[68618]: Warning: Unexpected line: Ring file /etc/swift/account.ring.gz not found, probably it hasn't been written yet Dec 3 09:09:20 np0005543227 puppet-user[68618]: Warning: Unexpected line: Devices: id region zone ip address:port replication ip:port name weight partitions balance flags meta Dec 3 09:09:20 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Tripleo::Profile::Base::Swift::Add_devices[r1z1-172.20.0.105:%PORT%/d1]/Ring_account_device[172.20.0.105:6002/d1]/ensure: created Dec 3 09:09:20 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[object]/Exec[rebalance_object]: Triggered 'refresh' from 3 events Dec 3 09:09:21 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[account]/Exec[rebalance_account]: Triggered 'refresh' from 3 events Dec 3 09:09:21 np0005543227 puppet-user[68618]: Notice: /Stage[main]/Tripleo::Profile::Base::Swift::Ringbuilder/Swift::Ringbuilder::Rebalance[container]/Exec[rebalance_container]: Triggered 'refresh' from 3 events Dec 3 09:09:21 np0005543227 puppet-user[68618]: Notice: Applied catalog in 7.49 seconds Dec 3 09:09:21 np0005543227 puppet-user[68618]: Application: Dec 3 09:09:21 np0005543227 puppet-user[68618]: Initial environment: production Dec 3 09:09:21 np0005543227 puppet-user[68618]: Converged environment: production Dec 3 09:09:21 np0005543227 puppet-user[68618]: Run mode: user Dec 3 09:09:21 np0005543227 puppet-user[68618]: Changes: Dec 3 09:09:21 np0005543227 puppet-user[68618]: Total: 21 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Events: Dec 3 09:09:21 np0005543227 puppet-user[68618]: Success: 21 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Total: 21 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Resources: Dec 3 09:09:21 np0005543227 puppet-user[68618]: Skipped: 16 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Changed: 21 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Out of sync: 21 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Restarted: 3 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Total: 38 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Time: Dec 3 09:09:21 np0005543227 puppet-user[68618]: File: 0.00 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Swift config: 0.01 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Config retrieval: 0.37 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Exec: 0.93 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Ring container device: 1.79 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Ring object device: 1.80 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Ring account device: 1.81 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Last run: 1764752961 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Transaction evaluation: 7.48 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Catalog application: 7.49 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Total: 7.49 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Version: Dec 3 09:09:21 np0005543227 puppet-user[68618]: Config: 1764752953 Dec 3 09:09:21 np0005543227 puppet-user[68618]: Puppet: 7.10.0 Dec 3 09:09:22 np0005543227 systemd[1]: libpod-709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e.scope: Deactivated successfully. Dec 3 09:09:22 np0005543227 systemd[1]: libpod-709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e.scope: Consumed 10.055s CPU time. Dec 3 09:09:22 np0005543227 podman[68484]: 2025-12-03 09:09:22.01423535 +0000 UTC m=+10.492006441 container died 709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, url=https://www.redhat.com, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, io.openshift.expose-services=, name=rhosp17/openstack-swift-proxy-server, release=1761123044, build-date=2025-11-19T00:12:50Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, com.redhat.component=openstack-swift-proxy-server-container, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, vcs-type=git, managed_by=tripleo_ansible, tcib_managed=true, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, maintainer=OpenStack TripleO Team, architecture=x86_64, config_id=tripleo_puppet_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, container_name=container-puppet-swift_ringbuilder) Dec 3 09:09:22 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:22 np0005543227 systemd[1]: var-lib-containers-storage-overlay-772c0faefe485f35fdcfface5f40911c7828aa57f7899fd556260f244905de2f-merged.mount: Deactivated successfully. Dec 3 09:09:22 np0005543227 podman[69002]: 2025-12-03 09:09:22.115077215 +0000 UTC m=+0.089976651 container cleanup 709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e (image=registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1, name=container-puppet-swift_ringbuilder, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=954196d89045e2492b9d148629fc509244e8701f, io.openshift.expose-services=, tcib_managed=true, vendor=Red Hat, Inc., version=17.1.12, io.k8s.description=Red Hat OpenStack Platform 17.1 swift-proxy-server, batch=17.1_20251118.1, build-date=2025-11-19T00:12:50Z, io.buildah.version=1.41.4, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-swift-proxy-server, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 swift-proxy-server, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-swift-proxy-server-container, config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']}, container_name=container-puppet-swift_ringbuilder, release=1761123044, config_id=tripleo_puppet_step1, managed_by=tripleo_ansible, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 swift-proxy-server, name=rhosp17/openstack-swift-proxy-server, vcs-type=git, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 swift-proxy-server, vcs-ref=954196d89045e2492b9d148629fc509244e8701f, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI) Dec 3 09:09:22 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:22 np0005543227 systemd[1]: libpod-conmon-709eea3de370f1f577db7da4f34ef815f6818838f9c94d14aeef8d0bd9958d1e.scope: Deactivated successfully. Dec 3 09:09:22 np0005543227 python3[62983]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name container-puppet-swift_ringbuilder --conmon-pidfile /run/container-puppet-swift_ringbuilder.pid --detach=False --entrypoint /var/lib/container-puppet/container-puppet.sh --env STEP=6 --env NET_HOST=true --env DEBUG=true --env HOSTNAME=np0005543227 --env NO_ARCHIVE= --env PUPPET_TAGS=file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball --env NAME=swift_ringbuilder --env STEP_CONFIG=include ::tripleo::packages#012include tripleo::profile::base::swift::ringbuilder#012 --label config_id=tripleo_puppet_step1 --label container_name=container-puppet-swift_ringbuilder --label managed_by=tripleo_ansible --label config_data={'security_opt': ['label=disable'], 'user': 0, 'detach': False, 'recreate': True, 'entrypoint': '/var/lib/container-puppet/container-puppet.sh', 'environment': {'STEP': 6, 'NET_HOST': 'true', 'DEBUG': 'true', 'HOSTNAME': 'np0005543227', 'NO_ARCHIVE': '', 'PUPPET_TAGS': 'file,file_line,concat,augeas,cron,swift_config,exec,fetch_swift_ring_tarball,extract_swift_ring_tarball,ring_object_device,swift::ringbuilder::create,tripleo::profile::base::swift::add_devices,swift::ringbuilder::rebalance,create_swift_ring_tarball,upload_swift_ring_tarball', 'NAME': 'swift_ringbuilder', 'STEP_CONFIG': 'include ::tripleo::packages\ninclude tripleo::profile::base::swift::ringbuilder\n'}, 'net': ['host'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1', 'volumes': ['/dev/log:/dev/log:rw', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/puppet:/tmp/puppet-etc:ro', '/usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro', '/var/lib/config-data:/var/lib/config-data:rw', '/var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro', '/var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro', '/var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/container-puppet-swift_ringbuilder.log --network host --security-opt label=disable --user 0 --volume /dev/log:/dev/log:rw --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/puppet:/tmp/puppet-etc:ro --volume /usr/share/openstack-puppet/modules:/usr/share/openstack-puppet/modules:ro --volume /var/lib/config-data:/var/lib/config-data:rw --volume /var/lib/container-puppet/container-puppet.sh:/var/lib/container-puppet/container-puppet.sh:ro --volume /var/lib/container-puppet/puppetlabs/facter.conf:/etc/puppetlabs/facter/facter.conf:ro --volume /var/lib/container-puppet/puppetlabs:/opt/puppetlabs:ro registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server:17.1 Dec 3 09:09:23 np0005543227 python3[69057]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:24 np0005543227 python3[69089]: ansible-stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:09:24 np0005543227 python3[69139]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-container-shutdown follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:24 np0005543227 python3[69182]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752964.287512-174176-247138863233217/source dest=/usr/libexec/tripleo-container-shutdown mode=0700 owner=root group=root _original_basename=tripleo-container-shutdown follow=False checksum=7d67b1986212f5548057505748cd74cfcf9c0d35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:25 np0005543227 python3[69244]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/tripleo-start-podman-container follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:25 np0005543227 python3[69287]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752965.1821768-174176-114420281674048/source dest=/usr/libexec/tripleo-start-podman-container mode=0700 owner=root group=root _original_basename=tripleo-start-podman-container follow=False checksum=536965633b8d3b1ce794269ffb07be0105a560a0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:26 np0005543227 python3[69349]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/tripleo-container-shutdown.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:26 np0005543227 python3[69392]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752966.19761-174283-93814412003110/source dest=/usr/lib/systemd/system/tripleo-container-shutdown.service mode=0644 owner=root group=root _original_basename=tripleo-container-shutdown-service follow=False checksum=66c1d41406ba8714feb9ed0a35259a7a57ef9707 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:27 np0005543227 python3[69454]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:27 np0005543227 python3[69497]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752967.20002-174314-265309558318808/source dest=/usr/lib/systemd/system-preset/91-tripleo-container-shutdown.preset mode=0644 owner=root group=root _original_basename=91-tripleo-container-shutdown-preset follow=False checksum=bccb1207dcbcfaa5ca05f83c8f36ce4c2460f081 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:28 np0005543227 python3[69527]: ansible-systemd Invoked with name=tripleo-container-shutdown state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:28 np0005543227 systemd[1]: Reloading. Dec 3 09:09:28 np0005543227 systemd-rc-local-generator[69552]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:28 np0005543227 systemd-sysv-generator[69555]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:28 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:28 np0005543227 systemd[1]: Reloading. Dec 3 09:09:28 np0005543227 systemd-sysv-generator[69593]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:28 np0005543227 systemd-rc-local-generator[69589]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:28 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:28 np0005543227 systemd[1]: Starting TripleO Container Shutdown... Dec 3 09:09:28 np0005543227 systemd[1]: Finished TripleO Container Shutdown. Dec 3 09:09:29 np0005543227 python3[69651]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/netns-placeholder.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:29 np0005543227 python3[69694]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752969.2797668-174609-203495128941345/source dest=/usr/lib/systemd/system/netns-placeholder.service mode=0644 owner=root group=root _original_basename=netns-placeholder-service follow=False checksum=8e9c6d5ce3a6e7f71c18780ec899f32f23de4c71 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:31 np0005543227 python3[69756]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system-preset/91-netns-placeholder.preset follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Dec 3 09:09:31 np0005543227 python3[69799]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752970.2035651-174649-56910659094547/source dest=/usr/lib/systemd/system-preset/91-netns-placeholder.preset mode=0644 owner=root group=root _original_basename=91-netns-placeholder-preset follow=False checksum=28b7b9aa893525d134a1eeda8a0a48fb25b736b9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:32 np0005543227 python3[69829]: ansible-systemd Invoked with name=netns-placeholder state=started enabled=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:32 np0005543227 systemd[1]: Reloading. Dec 3 09:09:32 np0005543227 systemd-rc-local-generator[69856]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:32 np0005543227 systemd-sysv-generator[69859]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:32 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:32 np0005543227 systemd[1]: Reloading. Dec 3 09:09:32 np0005543227 systemd-sysv-generator[69897]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:32 np0005543227 systemd-rc-local-generator[69892]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:32 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:32 np0005543227 systemd[1]: Starting Create netns directory... Dec 3 09:09:32 np0005543227 systemd[1]: run-netns-placeholder.mount: Deactivated successfully. Dec 3 09:09:32 np0005543227 systemd[1]: netns-placeholder.service: Deactivated successfully. Dec 3 09:09:32 np0005543227 systemd[1]: Finished Create netns directory. Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for memcached, new hash: 2e631a8a693ed18ad791fd5d2f59bb73 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for metrics_qdr, new hash: 87db6a4fa333251e5af3df88ac667383 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for mysql_bootstrap, new hash: e05767e6a58e95525169f395b32fe356 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for rabbitmq_bootstrap, new hash: 571d29b988998465110f3bdcb2eb6d61 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for redis_tls_proxy, new hash: 3e32e41096b3e07475384f44facd46df Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for clustercheck, new hash: b561e6f8d947a0d19188eb2473c3597a Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for horizon_fix_perms, new hash: 23ed46d04d31cd77a4db1d12deb47cd6 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for mysql_wait_bundle, new hash: e05767e6a58e95525169f395b32fe356 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_db_sync, new hash: 8037cb733553118cf556cf9c065f4155 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for collectd, new hash: 169d2790228984e78165d0f5d54a4b6d Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_db_sync, new hash: c4c64322068af8d7a5a6041e586be8ab-e7759d3e3947c31ed26c443a81eaf473 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine_db_sync, new hash: cef6f8b7918b716d8bf6f452160fb587 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for horizon, new hash: 23ed46d04d31cd77a4db1d12deb47cd6 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for iscsid, new hash: e7759d3e3947c31ed26c443a81eaf473 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for keystone, new hash: d1ad7676b3ff269019d90903a672eec5 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for keystone_cron, new hash: d1ad7676b3ff269019d90903a672eec5 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for keystone_db_sync, new hash: d1ad7676b3ff269019d90903a672eec5 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_db_sync, new hash: 077cebf49f354e91b2e0bd0b242bd275 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for neutron_db_sync, new hash: 7daf9b635e15ce81d9e0f8398882f01b Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_db_sync, new hash: 34136263cf636a8b81ae95989ceadf94 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_ensure_default_cells, new hash: 34136263cf636a8b81ae95989ceadf94 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_db_sync, new hash: 34136263cf636a8b81ae95989ceadf94 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for placement_api_db_sync, new hash: 89a84cf64ddc81f44d358a80ceb80f08 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for rsyslog, new hash: 39be3e5cad9245cd6d151657fb2ce49d Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_copy_rings, new hash: 72fd903a6e1a7269ad8feefe782acff0-b2d3643d16cefc3e23c40490fa0df0d6 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_central, new hash: c9e815994bc8c603efc255daa625229d Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for ceilometer_agent_notification, new hash: c9e815994bc8c603efc255daa625229d Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api, new hash: 8037cb733553118cf556cf9c065f4155 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for cinder_api_cron, new hash: 8037cb733553118cf556cf9c065f4155 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for cinder_scheduler, new hash: 8037cb733553118cf556cf9c065f4155 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for glance_api, new hash: c4c64322068af8d7a5a6041e586be8ab-e7759d3e3947c31ed26c443a81eaf473 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_cron, new hash: c4c64322068af8d7a5a6041e586be8ab Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal, new hash: 07895344b4f5ce2acb37889a62c16bc5-e7759d3e3947c31ed26c443a81eaf473 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_internal_tls_proxy, new hash: 07895344b4f5ce2acb37889a62c16bc5 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for glance_api_tls_proxy, new hash: c4c64322068af8d7a5a6041e586be8ab Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for heat_api, new hash: cd1317686bf2891ec1034c9d787670fa Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cfn, new hash: f26248a5d5e9d80aa2ee50df45fbb440 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for heat_api_cron, new hash: cd1317686bf2891ec1034c9d787670fa Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for heat_engine, new hash: cef6f8b7918b716d8bf6f452160fb587 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for logrotate_crond, new hash: 53ed83bb0cae779ff95edb2002262c6f Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for manila_api, new hash: 077cebf49f354e91b2e0bd0b242bd275 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for manila_api_cron, new hash: 077cebf49f354e91b2e0bd0b242bd275 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for manila_scheduler, new hash: 077cebf49f354e91b2e0bd0b242bd275 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for neutron_api, new hash: 7daf9b635e15ce81d9e0f8398882f01b Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for neutron_server_tls_proxy, new hash: 7daf9b635e15ce81d9e0f8398882f01b Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_api, new hash: 34136263cf636a8b81ae95989ceadf94 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_api_cron, new hash: 34136263cf636a8b81ae95989ceadf94 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_conductor, new hash: 34136263cf636a8b81ae95989ceadf94 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_metadata, new hash: cdc6cef80d805f9975091d9aac2e0999 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_scheduler, new hash: 34136263cf636a8b81ae95989ceadf94 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_vnc_proxy, new hash: 34136263cf636a8b81ae95989ceadf94 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for nova_wait_for_api_service, new hash: 34136263cf636a8b81ae95989ceadf94 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for placement_api, new hash: 89a84cf64ddc81f44d358a80ceb80f08 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for placement_wait_for_service, new hash: 89a84cf64ddc81f44d358a80ceb80f08 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_auditor, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_reaper, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_replicator, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_account_server, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_auditor, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_replicator, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_server, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_container_updater, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_auditor, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_expirer, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_replicator, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_server, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_object_updater, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_proxy_tls_proxy, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 python3[69920]: ansible-container_puppet_config [WARNING] Config change detected for swift_rsync, new hash: 72fd903a6e1a7269ad8feefe782acff0 Dec 3 09:09:33 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:33 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:34 np0005543227 python3[69977]: ansible-tripleo_container_manage Invoked with config_id=tripleo_step1 config_dir=/var/lib/tripleo-config/container-startup-config/step_1 config_patterns=*.json config_overrides={} concurrency=5 log_base_path=/var/log/containers/stdouts debug=False Dec 3 09:09:35 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:35 np0005543227 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Dec 3 09:09:35 np0005543227 podman[70142]: 2025-12-03 09:09:35.342455391 +0000 UTC m=+0.086681159 container create 5fc5e39e47c6203c5a59f8fdeb6081630d0cfc1b17ca52bfbc50b5c9aa2d34c6 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, managed_by=tripleo_ansible, build-date=2025-11-18T22:49:46Z, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, vcs-type=git, maintainer=OpenStack TripleO Team, distribution-scope=public, io.openshift.expose-services=, name=rhosp17/openstack-qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, batch=17.1_20251118.1, url=https://www.redhat.com, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=metrics_qdr_init_logs, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_id=tripleo_step1, tcib_managed=true) Dec 3 09:09:35 np0005543227 podman[70153]: 2025-12-03 09:09:35.353346177 +0000 UTC m=+0.084659848 container create fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 memcached, container_name=memcached, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, name=rhosp17/openstack-memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, release=1761123044, io.openshift.expose-services=, distribution-scope=public, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, tcib_managed=true, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, vcs-type=git, com.redhat.component=openstack-memcached-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:49:49Z, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 memcached, vendor=Red Hat, Inc., url=https://www.redhat.com) Dec 3 09:09:35 np0005543227 systemd[1]: Started libpod-conmon-5fc5e39e47c6203c5a59f8fdeb6081630d0cfc1b17ca52bfbc50b5c9aa2d34c6.scope. Dec 3 09:09:35 np0005543227 systemd[1]: Started libpod-conmon-fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290.scope. Dec 3 09:09:35 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:35 np0005543227 podman[70159]: 2025-12-03 09:09:35.400167799 +0000 UTC m=+0.125990760 container create f99a901b025a3a8e67ae67928b185f30c21de83302c87537c48e1b9c143ce7f5 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, konflux.additional-tags=17.1.12 17.1_20251118.1, distribution-scope=public, build-date=2025-11-18T22:49:50Z, vendor=Red Hat, Inc., url=https://www.redhat.com, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, vcs-type=git, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 rabbitmq, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '571d29b988998465110f3bdcb2eb6d61'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, managed_by=tripleo_ansible, com.redhat.component=openstack-rabbitmq-container, summary=Red Hat OpenStack Platform 17.1 rabbitmq, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-rabbitmq, batch=17.1_20251118.1, container_name=rabbitmq_bootstrap, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64) Dec 3 09:09:35 np0005543227 podman[70153]: 2025-12-03 09:09:35.300651524 +0000 UTC m=+0.031965255 image pull registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 09:09:35 np0005543227 podman[70142]: 2025-12-03 09:09:35.297973972 +0000 UTC m=+0.042199730 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:35 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:35 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7589a9349fd9dbac0a8bd95df15b6472e88a0f95bcf79030182e3536175e8ea3/merged/var/log/memcached supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:35 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/258f6f343bd8a620e8e3b8689b6c905e6c7c31496908f59b32fbf2f25e8ff450/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:35 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/7589a9349fd9dbac0a8bd95df15b6472e88a0f95bcf79030182e3536175e8ea3/merged/var/lib/kolla/config_files/src supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:35 np0005543227 podman[70159]: 2025-12-03 09:09:35.313244082 +0000 UTC m=+0.039067063 image pull registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 Dec 3 09:09:35 np0005543227 podman[70142]: 2025-12-03 09:09:35.415199081 +0000 UTC m=+0.159424849 container init 5fc5e39e47c6203c5a59f8fdeb6081630d0cfc1b17ca52bfbc50b5c9aa2d34c6 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, distribution-scope=public, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-qdrouterd-container, batch=17.1_20251118.1, managed_by=tripleo_ansible, tcib_managed=true, build-date=2025-11-18T22:49:46Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, vendor=Red Hat, Inc., description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.4, architecture=x86_64, version=17.1.12, container_name=metrics_qdr_init_logs) Dec 3 09:09:35 np0005543227 podman[70142]: 2025-12-03 09:09:35.433001309 +0000 UTC m=+0.177227067 container start 5fc5e39e47c6203c5a59f8fdeb6081630d0cfc1b17ca52bfbc50b5c9aa2d34c6 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, build-date=2025-11-18T22:49:46Z, version=17.1.12, summary=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, container_name=metrics_qdr_init_logs, config_id=tripleo_step1, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, batch=17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, release=1761123044, url=https://www.redhat.com, io.buildah.version=1.41.4, konflux.additional-tags=17.1.12 17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, architecture=x86_64, tcib_managed=true, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, managed_by=tripleo_ansible, description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd) Dec 3 09:09:35 np0005543227 podman[70142]: 2025-12-03 09:09:35.433161435 +0000 UTC m=+0.177387313 container attach 5fc5e39e47c6203c5a59f8fdeb6081630d0cfc1b17ca52bfbc50b5c9aa2d34c6 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, io.openshift.expose-services=, build-date=2025-11-18T22:49:46Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., container_name=metrics_qdr_init_logs, com.redhat.component=openstack-qdrouterd-container, url=https://www.redhat.com, name=rhosp17/openstack-qdrouterd, vcs-type=git, release=1761123044, tcib_managed=true, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1, version=17.1.12, managed_by=tripleo_ansible, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd) Dec 3 09:09:35 np0005543227 podman[70196]: 2025-12-03 09:09:35.43857634 +0000 UTC m=+0.113095422 container create c759bafe45e4f8fd79abc9937971744b09e7031d9c6e362bcbac25bb8d6d9ca1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, config_id=tripleo_step1, batch=17.1_20251118.1, vcs-type=git, io.openshift.expose-services=, name=rhosp17/openstack-mariadb, container_name=mysql_data_ownership, maintainer=OpenStack TripleO Team, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, konflux.additional-tags=17.1.12 17.1_20251118.1, io.buildah.version=1.41.4, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible, release=1761123044, build-date=2025-11-18T22:51:13Z, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, version=17.1.12) Dec 3 09:09:35 np0005543227 systemd[1]: Started libpod-conmon-f99a901b025a3a8e67ae67928b185f30c21de83302c87537c48e1b9c143ce7f5.scope. Dec 3 09:09:35 np0005543227 podman[70142]: 2025-12-03 09:09:35.445224266 +0000 UTC m=+0.189450044 container died 5fc5e39e47c6203c5a59f8fdeb6081630d0cfc1b17ca52bfbc50b5c9aa2d34c6 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-type=git, maintainer=OpenStack TripleO Team, build-date=2025-11-18T22:49:46Z, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., architecture=x86_64, description=Red Hat OpenStack Platform 17.1 qdrouterd, config_id=tripleo_step1, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, summary=Red Hat OpenStack Platform 17.1 qdrouterd, container_name=metrics_qdr_init_logs, release=1761123044, konflux.additional-tags=17.1.12 17.1_20251118.1, name=rhosp17/openstack-qdrouterd, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, batch=17.1_20251118.1, managed_by=tripleo_ansible, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, url=https://www.redhat.com, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd) Dec 3 09:09:35 np0005543227 systemd[1]: libpod-5fc5e39e47c6203c5a59f8fdeb6081630d0cfc1b17ca52bfbc50b5c9aa2d34c6.scope: Deactivated successfully. Dec 3 09:09:35 np0005543227 podman[70186]: 2025-12-03 09:09:35.347336412 +0000 UTC m=+0.051099514 image pull registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 09:09:35 np0005543227 systemd[1]: Started /usr/bin/podman healthcheck run fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290. Dec 3 09:09:35 np0005543227 podman[70153]: 2025-12-03 09:09:35.449632551 +0000 UTC m=+0.180946262 container init fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, io.openshift.expose-services=, batch=17.1_20251118.1, distribution-scope=public, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, description=Red Hat OpenStack Platform 17.1 memcached, version=17.1.12, release=1761123044, container_name=memcached, name=rhosp17/openstack-memcached, com.redhat.component=openstack-memcached-container, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, maintainer=OpenStack TripleO Team, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, architecture=x86_64, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vendor=Red Hat, Inc., summary=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:49:49Z, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1) Dec 3 09:09:35 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:35 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/e89cb1a2392910448144ba857fa6601921c88b9d48cd09a1c6ba467ec43a1da8/merged/var/lib/rabbitmq supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:35 np0005543227 podman[70159]: 2025-12-03 09:09:35.464337584 +0000 UTC m=+0.190160545 container init f99a901b025a3a8e67ae67928b185f30c21de83302c87537c48e1b9c143ce7f5 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, config_id=tripleo_step1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=rabbitmq_bootstrap, vcs-type=git, com.redhat.component=openstack-rabbitmq-container, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, version=17.1.12, name=rhosp17/openstack-rabbitmq, url=https://www.redhat.com, io.openshift.expose-services=, batch=17.1_20251118.1, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, release=1761123044, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '571d29b988998465110f3bdcb2eb6d61'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, maintainer=OpenStack TripleO Team, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:50Z, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4) Dec 3 09:09:35 np0005543227 systemd[1]: Started libpod-conmon-c759bafe45e4f8fd79abc9937971744b09e7031d9c6e362bcbac25bb8d6d9ca1.scope. Dec 3 09:09:35 np0005543227 podman[70159]: 2025-12-03 09:09:35.473066343 +0000 UTC m=+0.198889314 container start f99a901b025a3a8e67ae67928b185f30c21de83302c87537c48e1b9c143ce7f5 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=rabbitmq_bootstrap, vcs-type=git, config_id=tripleo_step1, url=https://www.redhat.com, release=1761123044, distribution-scope=public, tcib_managed=true, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '571d29b988998465110f3bdcb2eb6d61'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, architecture=x86_64, version=17.1.12, name=rhosp17/openstack-rabbitmq, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:49:50Z, maintainer=OpenStack TripleO Team, io.openshift.expose-services=, summary=Red Hat OpenStack Platform 17.1 rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, managed_by=tripleo_ansible, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-rabbitmq-container, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq) Dec 3 09:09:35 np0005543227 systemd[1]: Started /usr/bin/podman healthcheck run fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290. Dec 3 09:09:35 np0005543227 podman[70196]: 2025-12-03 09:09:35.381362489 +0000 UTC m=+0.055881611 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:09:35 np0005543227 python3[69977]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name rabbitmq_bootstrap --conmon-pidfile /run/rabbitmq_bootstrap.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_DEPLOY_IDENTIFIER=1764748258 --env TRIPLEO_CONFIG_HASH=571d29b988998465110f3bdcb2eb6d61 --label config_id=tripleo_step1 --label container_name=rabbitmq_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '571d29b988998465110f3bdcb2eb6d61'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/rabbitmq_bootstrap.log --network host --privileged=False --user root --volume /var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /var/lib/rabbitmq:/var/lib/rabbitmq:z --volume /etc/puppet:/etc/puppet:ro,z registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1 bash -ec kolla_set_configs#012if [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi#012hiera 'rabbitmq::erlang_cookie' > /var/lib/rabbitmq/.erlang.cookie#012chown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie#012chmod 400 /var/lib/rabbitmq/.erlang.cookie Dec 3 09:09:35 np0005543227 podman[70153]: 2025-12-03 09:09:35.482341388 +0000 UTC m=+0.213655069 container start fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, distribution-scope=public, vendor=Red Hat, Inc., url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-memcached-container, config_id=tripleo_step1, build-date=2025-11-18T22:49:49Z, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 memcached, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, container_name=memcached, summary=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, name=rhosp17/openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, vcs-type=git, io.openshift.expose-services=) Dec 3 09:09:35 np0005543227 python3[69977]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name memcached --conmon-pidfile /run/memcached.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=2e631a8a693ed18ad791fd5d2f59bb73 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=memcached --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/memcached.log --network host --privileged=False --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z --volume /var/log/containers/memcached:/var/log/memcached:rw --volume /etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro --volume /etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1 Dec 3 09:09:35 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:35 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/4cc39f72a3f84a7583d93654ef9b6adc25d5fe31b026f078b523f248d8a0f447/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:35 np0005543227 podman[70196]: 2025-12-03 09:09:35.567852141 +0000 UTC m=+0.242371223 container init c759bafe45e4f8fd79abc9937971744b09e7031d9c6e362bcbac25bb8d6d9ca1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, distribution-scope=public, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, architecture=x86_64, version=17.1.12, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, build-date=2025-11-18T22:51:13Z, container_name=mysql_data_ownership, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, konflux.additional-tags=17.1.12 17.1_20251118.1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, tcib_managed=true, vcs-type=git, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.openshift.expose-services=, name=rhosp17/openstack-mariadb, managed_by=tripleo_ansible, com.redhat.component=openstack-mariadb-container, release=1761123044, io.buildah.version=1.41.4, description=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc.) Dec 3 09:09:35 np0005543227 podman[70196]: 2025-12-03 09:09:35.574210207 +0000 UTC m=+0.248729289 container start c759bafe45e4f8fd79abc9937971744b09e7031d9c6e362bcbac25bb8d6d9ca1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, container_name=mysql_data_ownership, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, architecture=x86_64, vcs-type=git, config_id=tripleo_step1, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, batch=17.1_20251118.1, managed_by=tripleo_ansible, url=https://www.redhat.com, io.buildah.version=1.41.4, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:51:13Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, tcib_managed=true, maintainer=OpenStack TripleO Team) Dec 3 09:09:35 np0005543227 podman[70196]: 2025-12-03 09:09:35.574588868 +0000 UTC m=+0.249108030 container attach c759bafe45e4f8fd79abc9937971744b09e7031d9c6e362bcbac25bb8d6d9ca1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, release=1761123044, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, version=17.1.12, container_name=mysql_data_ownership, batch=17.1_20251118.1, url=https://www.redhat.com, build-date=2025-11-18T22:51:13Z, io.openshift.expose-services=, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, config_id=tripleo_step1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, summary=Red Hat OpenStack Platform 17.1 mariadb, maintainer=OpenStack TripleO Team, description=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.component=openstack-mariadb-container, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4, name=rhosp17/openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, architecture=x86_64, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible) Dec 3 09:09:35 np0005543227 systemd[1]: libpod-c759bafe45e4f8fd79abc9937971744b09e7031d9c6e362bcbac25bb8d6d9ca1.scope: Deactivated successfully. Dec 3 09:09:35 np0005543227 podman[70196]: 2025-12-03 09:09:35.577643032 +0000 UTC m=+0.252162134 container died c759bafe45e4f8fd79abc9937971744b09e7031d9c6e362bcbac25bb8d6d9ca1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, com.redhat.component=openstack-mariadb-container, description=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, batch=17.1_20251118.1, url=https://www.redhat.com, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, managed_by=tripleo_ansible, version=17.1.12, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, container_name=mysql_data_ownership, io.openshift.expose-services=, architecture=x86_64, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, summary=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, build-date=2025-11-18T22:51:13Z, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_id=tripleo_step1, name=rhosp17/openstack-mariadb, maintainer=OpenStack TripleO Team, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, tcib_managed=true, vendor=Red Hat, Inc.) Dec 3 09:09:35 np0005543227 podman[70233]: 2025-12-03 09:09:35.591243311 +0000 UTC m=+0.137945788 container cleanup 5fc5e39e47c6203c5a59f8fdeb6081630d0cfc1b17ca52bfbc50b5c9aa2d34c6 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr_init_logs, distribution-scope=public, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, summary=Red Hat OpenStack Platform 17.1 qdrouterd, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_step1, config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']}, name=rhosp17/openstack-qdrouterd, container_name=metrics_qdr_init_logs, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, maintainer=OpenStack TripleO Team, build-date=2025-11-18T22:49:46Z, vendor=Red Hat, Inc., tcib_managed=true, io.buildah.version=1.41.4, com.redhat.component=openstack-qdrouterd-container, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, batch=17.1_20251118.1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, managed_by=tripleo_ansible) Dec 3 09:09:35 np0005543227 systemd[1]: libpod-conmon-5fc5e39e47c6203c5a59f8fdeb6081630d0cfc1b17ca52bfbc50b5c9aa2d34c6.scope: Deactivated successfully. Dec 3 09:09:35 np0005543227 python3[69977]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr_init_logs --conmon-pidfile /run/metrics_qdr_init_logs.pid --detach=False --label config_id=tripleo_step1 --label container_name=metrics_qdr_init_logs --label managed_by=tripleo_ansible --label config_data={'command': ['/bin/bash', '-c', 'chown -R qdrouterd:qdrouterd /var/log/qdrouterd'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'none', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/log/containers/metrics_qdr:/var/log/qdrouterd:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr_init_logs.log --network none --privileged=False --user root --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 /bin/bash -c chown -R qdrouterd:qdrouterd /var/log/qdrouterd Dec 3 09:09:35 np0005543227 systemd[1]: libpod-f99a901b025a3a8e67ae67928b185f30c21de83302c87537c48e1b9c143ce7f5.scope: Deactivated successfully. Dec 3 09:09:35 np0005543227 podman[70345]: 2025-12-03 09:09:35.650290609 +0000 UTC m=+0.030463649 container died f99a901b025a3a8e67ae67928b185f30c21de83302c87537c48e1b9c143ce7f5 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-type=git, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, architecture=x86_64, name=rhosp17/openstack-rabbitmq, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vendor=Red Hat, Inc., org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, distribution-scope=public, managed_by=tripleo_ansible, summary=Red Hat OpenStack Platform 17.1 rabbitmq, container_name=rabbitmq_bootstrap, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '571d29b988998465110f3bdcb2eb6d61'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, tcib_managed=true, release=1761123044, com.redhat.component=openstack-rabbitmq-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, batch=17.1_20251118.1, build-date=2025-11-18T22:49:50Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, version=17.1.12, url=https://www.redhat.com, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, description=Red Hat OpenStack Platform 17.1 rabbitmq, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, config_id=tripleo_step1, io.buildah.version=1.41.4) Dec 3 09:09:35 np0005543227 podman[70345]: 2025-12-03 09:09:35.667174579 +0000 UTC m=+0.047347599 container cleanup f99a901b025a3a8e67ae67928b185f30c21de83302c87537c48e1b9c143ce7f5 (image=registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1, name=rabbitmq_bootstrap, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 rabbitmq, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-rabbitmq, summary=Red Hat OpenStack Platform 17.1 rabbitmq, tcib_managed=true, version=17.1.12, description=Red Hat OpenStack Platform 17.1 rabbitmq, managed_by=tripleo_ansible, config_data={'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1764748258', 'TRIPLEO_CONFIG_HASH': '571d29b988998465110f3bdcb2eb6d61'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, io.openshift.expose-services=, release=1761123044, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, com.redhat.component=openstack-rabbitmq-container, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, distribution-scope=public, vcs-type=git, io.buildah.version=1.41.4, url=https://www.redhat.com, architecture=x86_64, build-date=2025-11-18T22:49:50Z, container_name=rabbitmq_bootstrap, konflux.additional-tags=17.1.12 17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 rabbitmq, maintainer=OpenStack TripleO Team, name=rhosp17/openstack-rabbitmq) Dec 3 09:09:35 np0005543227 systemd[1]: libpod-conmon-f99a901b025a3a8e67ae67928b185f30c21de83302c87537c48e1b9c143ce7f5.scope: Deactivated successfully. Dec 3 09:09:35 np0005543227 podman[70186]: 2025-12-03 09:09:35.669868712 +0000 UTC m=+0.373631774 container create 55c65e2f37567ff1274913e0880fcbc2a0ec55a262bdae8813572c24b477d208 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 redis, name=rhosp17/openstack-redis, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, config_id=tripleo_step1, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3e32e41096b3e07475384f44facd46df'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, summary=Red Hat OpenStack Platform 17.1 redis, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, version=17.1.12, container_name=redis_tls_proxy, maintainer=OpenStack TripleO Team, managed_by=tripleo_ansible, architecture=x86_64, io.openshift.expose-services=, vcs-type=git, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, release=1761123044, com.redhat.component=openstack-redis-container, io.buildah.version=1.41.4, url=https://www.redhat.com, tcib_managed=true, build-date=2025-11-18T22:49:49Z) Dec 3 09:09:35 np0005543227 systemd[1]: Started libpod-conmon-55c65e2f37567ff1274913e0880fcbc2a0ec55a262bdae8813572c24b477d208.scope. Dec 3 09:09:35 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:35 np0005543227 podman[70252]: 2025-12-03 09:09:35.658923235 +0000 UTC m=+0.173851644 container health_status fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=starting, summary=Red Hat OpenStack Platform 17.1 memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, description=Red Hat OpenStack Platform 17.1 memcached, io.openshift.expose-services=, tcib_managed=true, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.component=openstack-memcached-container, config_id=tripleo_step1, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, build-date=2025-11-18T22:49:49Z, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, version=17.1.12, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=memcached, vendor=Red Hat, Inc., url=https://www.redhat.com, release=1761123044, name=rhosp17/openstack-memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, vcs-type=git, architecture=x86_64, batch=17.1_20251118.1) Dec 3 09:09:35 np0005543227 podman[70324]: 2025-12-03 09:09:35.763790864 +0000 UTC m=+0.176147994 container cleanup c759bafe45e4f8fd79abc9937971744b09e7031d9c6e362bcbac25bb8d6d9ca1 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_data_ownership, com.redhat.component=openstack-mariadb-container, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, distribution-scope=public, managed_by=tripleo_ansible, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., version=17.1.12, batch=17.1_20251118.1, url=https://www.redhat.com, vcs-type=git, config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=mysql_data_ownership, build-date=2025-11-18T22:51:13Z, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, summary=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-mariadb, architecture=x86_64, tcib_managed=true, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 mariadb) Dec 3 09:09:35 np0005543227 systemd[1]: libpod-conmon-c759bafe45e4f8fd79abc9937971744b09e7031d9c6e362bcbac25bb8d6d9ca1.scope: Deactivated successfully. Dec 3 09:09:35 np0005543227 python3[69977]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_data_ownership --conmon-pidfile /run/mysql_data_ownership.pid --detach=False --label config_id=tripleo_step1 --label container_name=mysql_data_ownership --label managed_by=tripleo_ansible --label config_data={'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_data_ownership.log --network host --user root --volume /var/lib/mysql:/var/lib/mysql:z registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 chown -R mysql: /var/lib/mysql Dec 3 09:09:35 np0005543227 podman[70252]: 2025-12-03 09:09:35.79323121 +0000 UTC m=+0.308159689 container exec_died fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, name=rhosp17/openstack-memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, io.openshift.expose-services=, batch=17.1_20251118.1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, version=17.1.12, com.redhat.component=openstack-memcached-container, architecture=x86_64, description=Red Hat OpenStack Platform 17.1 memcached, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:49:49Z, url=https://www.redhat.com, vcs-type=git, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, summary=Red Hat OpenStack Platform 17.1 memcached, tcib_managed=true, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, container_name=memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, distribution-scope=public, config_id=tripleo_step1, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05) Dec 3 09:09:35 np0005543227 systemd[1]: fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290.service: Deactivated successfully. Dec 3 09:09:35 np0005543227 podman[70186]: 2025-12-03 09:09:35.813972688 +0000 UTC m=+0.517735750 container init 55c65e2f37567ff1274913e0880fcbc2a0ec55a262bdae8813572c24b477d208 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, vcs-type=git, config_id=tripleo_step1, summary=Red Hat OpenStack Platform 17.1 redis, vendor=Red Hat, Inc., io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, release=1761123044, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 redis, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, architecture=x86_64, com.redhat.component=openstack-redis-container, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, version=17.1.12, maintainer=OpenStack TripleO Team, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-redis, build-date=2025-11-18T22:49:49Z, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.buildah.version=1.41.4, url=https://www.redhat.com, managed_by=tripleo_ansible, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, tcib_managed=true, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3e32e41096b3e07475384f44facd46df'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, container_name=redis_tls_proxy) Dec 3 09:09:35 np0005543227 podman[70186]: 2025-12-03 09:09:35.824924875 +0000 UTC m=+0.528687937 container start 55c65e2f37567ff1274913e0880fcbc2a0ec55a262bdae8813572c24b477d208 (image=registry.redhat.io/rhosp-rhel9/openstack-redis:17.1, name=redis_tls_proxy, konflux.additional-tags=17.1.12 17.1_20251118.1, tcib_managed=true, name=rhosp17/openstack-redis, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, batch=17.1_20251118.1, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3e32e41096b3e07475384f44facd46df'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}, architecture=x86_64, release=1761123044, build-date=2025-11-18T22:49:49Z, vcs-type=git, config_id=tripleo_step1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 redis, distribution-scope=public, version=17.1.12, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-redis, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 redis, container_name=redis_tls_proxy, url=https://www.redhat.com, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.k8s.description=Red Hat OpenStack Platform 17.1 redis, com.redhat.component=openstack-redis-container, summary=Red Hat OpenStack Platform 17.1 redis) Dec 3 09:09:35 np0005543227 python3[69977]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name redis_tls_proxy --conmon-pidfile /run/redis_tls_proxy.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=3e32e41096b3e07475384f44facd46df --label config_id=tripleo_step1 --label container_name=redis_tls_proxy --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '3e32e41096b3e07475384f44facd46df'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/redis_tls_proxy.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro --volume /etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro --volume /etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro --volume /var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro registry.redhat.io/rhosp-rhel9/openstack-redis:17.1 Dec 3 09:09:36 np0005543227 podman[70533]: 2025-12-03 09:09:36.277446738 +0000 UTC m=+0.076317280 container create 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, vcs-type=git, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, container_name=metrics_qdr, architecture=x86_64, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, release=1761123044, vendor=Red Hat, Inc., maintainer=OpenStack TripleO Team, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '87db6a4fa333251e5af3df88ac667383'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:46Z, url=https://www.redhat.com, version=17.1.12, tcib_managed=true) Dec 3 09:09:36 np0005543227 podman[70539]: 2025-12-03 09:09:36.302586802 +0000 UTC m=+0.089393563 container create 47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, vendor=Red Hat, Inc., name=rhosp17/openstack-mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, container_name=mysql_bootstrap, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, build-date=2025-11-18T22:51:13Z, description=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, architecture=x86_64, summary=Red Hat OpenStack Platform 17.1 mariadb, url=https://www.redhat.com, io.buildah.version=1.41.4, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, com.redhat.component=openstack-mariadb-container, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, managed_by=tripleo_ansible, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, batch=17.1_20251118.1, version=17.1.12, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e05767e6a58e95525169f395b32fe356'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb) Dec 3 09:09:36 np0005543227 systemd[1]: Started libpod-conmon-850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5.scope. Dec 3 09:09:36 np0005543227 systemd[1]: Started libpod-conmon-47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7.scope. Dec 3 09:09:36 np0005543227 podman[70533]: 2025-12-03 09:09:36.235918009 +0000 UTC m=+0.034788541 image pull registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:36 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:36 np0005543227 systemd[1]: Started libcrun container. Dec 3 09:09:36 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c497a293b3d267662c6edeac1e7445e8fca79f999f48ff49b8d010a4bbf39e50/merged/var/lib/mysql supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:36 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/57d39cacf486f36329324e62edb5f1e45c0a987b9d40e30dcc022ae61aa57aa4/merged/var/lib/qdrouterd supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:36 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/57d39cacf486f36329324e62edb5f1e45c0a987b9d40e30dcc022ae61aa57aa4/merged/var/log/qdrouterd supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:36 np0005543227 kernel: xfs filesystem being remounted at /var/lib/containers/storage/overlay/c497a293b3d267662c6edeac1e7445e8fca79f999f48ff49b8d010a4bbf39e50/merged/var/lib/kolla/config_files/config.json supports timestamps until 2038 (0x7fffffff) Dec 3 09:09:36 np0005543227 podman[70539]: 2025-12-03 09:09:36.267149851 +0000 UTC m=+0.053956632 image pull registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 Dec 3 09:09:36 np0005543227 systemd[1]: Started /usr/bin/podman healthcheck run 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5. Dec 3 09:09:36 np0005543227 podman[70533]: 2025-12-03 09:09:36.380319946 +0000 UTC m=+0.179190498 container init 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, architecture=x86_64, config_id=tripleo_step1, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-type=git, batch=17.1_20251118.1, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, url=https://www.redhat.com, distribution-scope=public, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '87db6a4fa333251e5af3df88ac667383'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, tcib_managed=true, name=rhosp17/openstack-qdrouterd, com.redhat.component=openstack-qdrouterd-container, managed_by=tripleo_ansible, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, konflux.additional-tags=17.1.12 17.1_20251118.1, description=Red Hat OpenStack Platform 17.1 qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vendor=Red Hat, Inc., io.buildah.version=1.41.4, container_name=metrics_qdr, build-date=2025-11-18T22:49:46Z) Dec 3 09:09:36 np0005543227 systemd[1]: Started /usr/bin/podman healthcheck run 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5. Dec 3 09:09:36 np0005543227 podman[70539]: 2025-12-03 09:09:36.410945649 +0000 UTC m=+0.197752420 container init 47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, architecture=x86_64, maintainer=OpenStack TripleO Team, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e05767e6a58e95525169f395b32fe356'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, build-date=2025-11-18T22:51:13Z, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, version=17.1.12, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, description=Red Hat OpenStack Platform 17.1 mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, name=rhosp17/openstack-mariadb, release=1761123044, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, url=https://www.redhat.com, managed_by=tripleo_ansible, container_name=mysql_bootstrap, com.redhat.component=openstack-mariadb-container, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, distribution-scope=public, vendor=Red Hat, Inc.) Dec 3 09:09:36 np0005543227 podman[70533]: 2025-12-03 09:09:36.417039686 +0000 UTC m=+0.215910228 container start 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, description=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., build-date=2025-11-18T22:49:46Z, io.openshift.expose-services=, com.redhat.component=openstack-qdrouterd-container, tcib_managed=true, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, container_name=metrics_qdr, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, batch=17.1_20251118.1, maintainer=OpenStack TripleO Team, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, konflux.additional-tags=17.1.12 17.1_20251118.1, release=1761123044, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, architecture=x86_64, config_id=tripleo_step1, distribution-scope=public, vcs-type=git, version=17.1.12, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, managed_by=tripleo_ansible, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '87db6a4fa333251e5af3df88ac667383'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, url=https://www.redhat.com, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd) Dec 3 09:09:36 np0005543227 podman[70539]: 2025-12-03 09:09:36.420604996 +0000 UTC m=+0.207411777 container start 47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, release=1761123044, distribution-scope=public, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, vcs-type=git, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e05767e6a58e95525169f395b32fe356'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, version=17.1.12, com.redhat.component=openstack-mariadb-container, tcib_managed=true, url=https://www.redhat.com, vendor=Red Hat, Inc., build-date=2025-11-18T22:51:13Z, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.openshift.expose-services=, managed_by=tripleo_ansible, container_name=mysql_bootstrap, architecture=x86_64, name=rhosp17/openstack-mariadb, summary=Red Hat OpenStack Platform 17.1 mariadb, batch=17.1_20251118.1, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.buildah.version=1.41.4) Dec 3 09:09:36 np0005543227 podman[70539]: 2025-12-03 09:09:36.420965467 +0000 UTC m=+0.207772218 container attach 47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, description=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.expose-services=, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, vcs-type=git, url=https://www.redhat.com, build-date=2025-11-18T22:51:13Z, com.redhat.component=openstack-mariadb-container, summary=Red Hat OpenStack Platform 17.1 mariadb, konflux.additional-tags=17.1.12 17.1_20251118.1, batch=17.1_20251118.1, io.buildah.version=1.41.4, tcib_managed=true, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, managed_by=tripleo_ansible, container_name=mysql_bootstrap, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, config_id=tripleo_step1, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, name=rhosp17/openstack-mariadb, maintainer=OpenStack TripleO Team, version=17.1.12, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e05767e6a58e95525169f395b32fe356'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, architecture=x86_64, distribution-scope=public, vendor=Red Hat, Inc.) Dec 3 09:09:36 np0005543227 python3[69977]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name metrics_qdr --conmon-pidfile /run/metrics_qdr.pid --detach=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=87db6a4fa333251e5af3df88ac667383 --healthcheck-command /openstack/healthcheck --label config_id=tripleo_step1 --label container_name=metrics_qdr --label managed_by=tripleo_ansible --label config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '87db6a4fa333251e5af3df88ac667383'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/metrics_qdr.log --network host --privileged=False --user qdrouterd --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro --volume /var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro --volume /var/lib/metrics_qdr:/var/lib/qdrouterd:z --volume /var/log/containers/metrics_qdr:/var/log/qdrouterd:z --volume /etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro --volume /etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1 Dec 3 09:09:36 np0005543227 podman[70572]: 2025-12-03 09:09:36.507948015 +0000 UTC m=+0.084725750 container health_status 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=starting, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, config_id=tripleo_step1, batch=17.1_20251118.1, release=1761123044, maintainer=OpenStack TripleO Team, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, name=rhosp17/openstack-qdrouterd, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, container_name=metrics_qdr, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, com.redhat.component=openstack-qdrouterd-container, vcs-type=git, version=17.1.12, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '87db6a4fa333251e5af3df88ac667383'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, managed_by=tripleo_ansible, architecture=x86_64, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:46Z, tcib_managed=true, io.openshift.expose-services=, description=Red Hat OpenStack Platform 17.1 qdrouterd, io.buildah.version=1.41.4, url=https://www.redhat.com) Dec 3 09:09:36 np0005543227 podman[70572]: 2025-12-03 09:09:36.69387912 +0000 UTC m=+0.270656875 container exec_died 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, maintainer=OpenStack TripleO Team, url=https://www.redhat.com, com.redhat.component=openstack-qdrouterd-container, io.openshift.expose-services=, io.buildah.version=1.41.4, name=rhosp17/openstack-qdrouterd, version=17.1.12, description=Red Hat OpenStack Platform 17.1 qdrouterd, release=1761123044, vcs-type=git, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, build-date=2025-11-18T22:49:46Z, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, batch=17.1_20251118.1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '87db6a4fa333251e5af3df88ac667383'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, summary=Red Hat OpenStack Platform 17.1 qdrouterd, vendor=Red Hat, Inc., architecture=x86_64, tcib_managed=true, container_name=metrics_qdr, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, distribution-scope=public, config_id=tripleo_step1, konflux.additional-tags=17.1.12 17.1_20251118.1) Dec 3 09:09:36 np0005543227 systemd[1]: 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5.service: Deactivated successfully. Dec 3 09:09:42 np0005543227 systemd[1]: libpod-47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7.scope: Deactivated successfully. Dec 3 09:09:42 np0005543227 systemd[1]: libpod-47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7.scope: Consumed 2.638s CPU time. Dec 3 09:09:42 np0005543227 podman[71372]: 2025-12-03 09:09:42.495713038 +0000 UTC m=+0.061573997 container died 47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e05767e6a58e95525169f395b32fe356'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, io.openshift.expose-services=, build-date=2025-11-18T22:51:13Z, container_name=mysql_bootstrap, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, name=rhosp17/openstack-mariadb, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, managed_by=tripleo_ansible, maintainer=OpenStack TripleO Team, release=1761123044, distribution-scope=public, version=17.1.12, konflux.additional-tags=17.1.12 17.1_20251118.1, vendor=Red Hat, Inc., architecture=x86_64, com.redhat.component=openstack-mariadb-container, batch=17.1_20251118.1, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 mariadb, io.buildah.version=1.41.4, summary=Red Hat OpenStack Platform 17.1 mariadb, vcs-type=git, tcib_managed=true) Dec 3 09:09:42 np0005543227 systemd[1]: var-lib-containers-storage-overlay\x2dcontainers-47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7-userdata-shm.mount: Deactivated successfully. Dec 3 09:09:42 np0005543227 systemd[1]: var-lib-containers-storage-overlay-c497a293b3d267662c6edeac1e7445e8fca79f999f48ff49b8d010a4bbf39e50-merged.mount: Deactivated successfully. Dec 3 09:09:42 np0005543227 podman[71372]: 2025-12-03 09:09:42.538077272 +0000 UTC m=+0.103938191 container cleanup 47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7 (image=registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1, name=mysql_bootstrap, tcib_managed=true, com.redhat.component=openstack-mariadb-container, version=17.1.12, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, config_id=tripleo_step1, vcs-type=git, managed_by=tripleo_ansible, batch=17.1_20251118.1, architecture=x86_64, io.openshift.expose-services=, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, konflux.additional-tags=17.1.12 17.1_20251118.1, config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e05767e6a58e95525169f395b32fe356'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, summary=Red Hat OpenStack Platform 17.1 mariadb, release=1761123044, vendor=Red Hat, Inc., baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, build-date=2025-11-18T22:51:13Z, name=rhosp17/openstack-mariadb, maintainer=OpenStack TripleO Team, distribution-scope=public, description=Red Hat OpenStack Platform 17.1 mariadb, io.k8s.description=Red Hat OpenStack Platform 17.1 mariadb, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-mariadb, io.k8s.display-name=Red Hat OpenStack Platform 17.1 mariadb, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.buildah.version=1.41.4, url=https://www.redhat.com, container_name=mysql_bootstrap) Dec 3 09:09:42 np0005543227 systemd[1]: libpod-conmon-47387f481c9be0246ef4b69d7227494e2af67098d25dc43c45e8330431a385d7.scope: Deactivated successfully. Dec 3 09:09:42 np0005543227 python3[69977]: ansible-tripleo_container_manage PODMAN-CONTAINER-DEBUG: podman run --name mysql_bootstrap --conmon-pidfile /run/mysql_bootstrap.pid --detach=False --env DB_MARIABACKUP_PASSWORD=dW8SB77SGTvKvQyglkYt66NDM --env DB_MARIABACKUP_USER=mariabackup --env DB_MAX_TIMEOUT=60 --env KOLLA_BOOTSTRAP=True --env KOLLA_CONFIG_STRATEGY=COPY_ALWAYS --env TRIPLEO_CONFIG_HASH=e05767e6a58e95525169f395b32fe356 --label config_id=tripleo_step1 --label container_name=mysql_bootstrap --label managed_by=tripleo_ansible --label config_data={'command': ['bash', '-ec', 'if [ -e /var/lib/mysql/mysql ]; then exit 0; fi\necho -e "\\n[mysqld]\\nwsrep_provider=none" >> /etc/my.cnf\nexport DB_ROOT_PASSWORD=$(hiera \'mysql::server::root_password\')\nkolla_set_configs\nsudo -u mysql -E kolla_extend_start\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done\'\nmysqld_safe --skip-networking --wsrep-on=OFF &\ntimeout ${DB_MAX_TIMEOUT} /bin/bash -c \'until mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" ping 2>/dev/null; do sleep 1; done\'\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "CREATE USER \'clustercheck\'@\'localhost\' IDENTIFIED BY \'$(hiera mysql_clustercheck_password)\';"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "GRANT PROCESS ON *.* TO \'clustercheck\'@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'dW8SB77SGTvKvQyglkYt66NDM', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': 'e05767e6a58e95525169f395b32fe356'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']} --log-driver k8s-file --log-opt path=/var/log/containers/stdouts/mysql_bootstrap.log --network host --user root --volume /etc/hosts:/etc/hosts:ro --volume /etc/localtime:/etc/localtime:ro --volume /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro --volume /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro --volume /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro --volume /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro --volume /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro --volume /dev/log:/dev/log --volume /etc/ipa/ca.crt:/etc/ipa/ca.crt:ro --volume /etc/puppet:/etc/puppet:ro --volume /var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z --volume /var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z --volume /var/lib/mysql:/var/lib/mysql:rw,z --volume /etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro --volume /etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1 bash -ec if [ -e /var/lib/mysql/mysql ]; then exit 0; fi#012echo -e "\n[mysqld]\nwsrep_provider=none" >> /etc/my.cnf#012export DB_ROOT_PASSWORD=$(hiera 'mysql::server::root_password')#012kolla_set_configs#012sudo -u mysql -E kolla_extend_start#012timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'while pgrep -af /usr/bin/mysqld_safe | grep -q -v grep; do sleep 1; done'#012mysqld_safe --skip-networking --wsrep-on=OFF timeout ${DB_MAX_TIMEOUT} /bin/bash -c 'until mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" ping 2>/dev/null; do sleep 1; done'#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "CREATE USER 'clustercheck'@'localhost' IDENTIFIED BY '$(hiera mysql_clustercheck_password)';"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "GRANT PROCESS ON *.* TO 'clustercheck'@'localhost' WITH GRANT OPTION;"#012mysql -uroot -p"$(hiera 'mysql::server::root_password')" -e "DELETE FROM mysql.user WHERE user = 'root' AND host NOT IN ('%','localhost');"#012timeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera 'mysql::server::root_password')" shutdown Dec 3 09:09:43 np0005543227 python3[71425]: ansible-file Invoked with path=/etc/systemd/system/tripleo_memcached.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:43 np0005543227 python3[71441]: ansible-file Invoked with path=/etc/systemd/system/tripleo_metrics_qdr.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:43 np0005543227 python3[71457]: ansible-file Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy.requires state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:43 np0005543227 python3[71473]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_memcached_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:09:44 np0005543227 python3[71489]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_metrics_qdr_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:09:44 np0005543227 python3[71505]: ansible-stat Invoked with path=/etc/systemd/system/tripleo_redis_tls_proxy_healthcheck.timer follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Dec 3 09:09:45 np0005543227 python3[71566]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752984.609869-175021-193433587338132/source dest=/etc/systemd/system/tripleo_memcached.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:45 np0005543227 python3[71595]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752984.609869-175021-193433587338132/source dest=/etc/systemd/system/tripleo_metrics_qdr.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:46 np0005543227 python3[71624]: ansible-copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1764752984.609869-175021-193433587338132/source dest=/etc/systemd/system/tripleo_redis_tls_proxy.service mode=0644 owner=root group=root backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None checksum=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:46 np0005543227 python3[71640]: ansible-systemd Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Dec 3 09:09:46 np0005543227 systemd[1]: Reloading. Dec 3 09:09:46 np0005543227 systemd-rc-local-generator[71665]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:46 np0005543227 systemd-sysv-generator[71670]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:46 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:47 np0005543227 python3[71692]: ansible-systemd Invoked with state=restarted name=tripleo_memcached.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:47 np0005543227 systemd[1]: Reloading. Dec 3 09:09:47 np0005543227 systemd-sysv-generator[71723]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:47 np0005543227 systemd-rc-local-generator[71719]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:47 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:48 np0005543227 systemd[1]: Starting memcached container... Dec 3 09:09:48 np0005543227 systemd[1]: Started memcached container. Dec 3 09:09:48 np0005543227 python3[71759]: ansible-systemd Invoked with state=restarted name=tripleo_metrics_qdr.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:48 np0005543227 systemd[1]: Reloading. Dec 3 09:09:49 np0005543227 systemd-rc-local-generator[71788]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:49 np0005543227 systemd-sysv-generator[71792]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:49 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:49 np0005543227 systemd[1]: Starting metrics_qdr container... Dec 3 09:09:49 np0005543227 systemd[1]: Started metrics_qdr container. Dec 3 09:09:50 np0005543227 python3[71826]: ansible-systemd Invoked with state=restarted name=tripleo_redis_tls_proxy.service enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Dec 3 09:09:51 np0005543227 systemd[1]: Reloading. Dec 3 09:09:51 np0005543227 systemd-rc-local-generator[71850]: /etc/rc.d/rc.local is not marked executable, skipping. Dec 3 09:09:51 np0005543227 systemd-sysv-generator[71853]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Dec 3 09:09:51 np0005543227 systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 3 09:09:51 np0005543227 systemd[1]: Starting redis_tls_proxy container... Dec 3 09:09:51 np0005543227 systemd[1]: Started redis_tls_proxy container. Dec 3 09:09:52 np0005543227 python3[71907]: ansible-file Invoked with path=/var/lib/container-puppet/container-puppet-tasks1.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:53 np0005543227 python3[72028]: ansible-container_puppet_config Invoked with check_mode=False config_vol_prefix=/var/lib/config-data debug=True net_host=True no_archive=True puppet_config=/var/lib/container-puppet/container-puppet-tasks1.json short_hostname=np0005543227 step=1 update_config_hash_only=False Dec 3 09:09:54 np0005543227 python3[72044]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory owner=root group=root recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None seuser=None serole=None selevel=None setype=None attributes=None Dec 3 09:09:54 np0005543227 python3[72060]: ansible-container_config_data Invoked with config_path=/var/lib/tripleo-config/container-puppet-config/step_1 config_pattern=container-puppet-*.json config_overrides={} debug=True Dec 3 09:10:06 np0005543227 systemd[1]: Started /usr/bin/podman healthcheck run fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290. Dec 3 09:10:06 np0005543227 podman[72061]: 2025-12-03 09:10:06.387875193 +0000 UTC m=+0.096887293 container health_status fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, health_status=healthy, architecture=x86_64, name=rhosp17/openstack-memcached, vendor=Red Hat, Inc., com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 memcached, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, config_id=tripleo_step1, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, io.openshift.expose-services=, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, release=1761123044, vcs-type=git, distribution-scope=public, build-date=2025-11-18T22:49:49Z, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, konflux.additional-tags=17.1.12 17.1_20251118.1, maintainer=OpenStack TripleO Team, io.buildah.version=1.41.4, managed_by=tripleo_ansible, version=17.1.12, com.redhat.component=openstack-memcached-container, url=https://www.redhat.com, batch=17.1_20251118.1, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, tcib_managed=true, summary=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, container_name=memcached) Dec 3 09:10:06 np0005543227 podman[72061]: 2025-12-03 09:10:06.408616622 +0000 UTC m=+0.117628702 container exec_died fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290 (image=registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1, name=memcached, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '2e631a8a693ed18ad791fd5d2f59bb73'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-memcached:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 0, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/memcached.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/memcached:/var/lib/kolla/config_files/src:rw,z', '/var/log/containers/memcached:/var/log/memcached:rw', '/etc/pki/tls/certs/memcached.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/memcached.crt:ro', '/etc/pki/tls/private/memcached.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/memcached.key:ro']}, name=rhosp17/openstack-memcached, tcib_managed=true, io.buildah.version=1.41.4, build-date=2025-11-18T22:49:49Z, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 memcached, vcs-type=git, distribution-scope=public, io.k8s.description=Red Hat OpenStack Platform 17.1 memcached, config_id=tripleo_step1, container_name=memcached, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-memcached, url=https://www.redhat.com, batch=17.1_20251118.1, vendor=Red Hat, Inc., vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, managed_by=tripleo_ansible, io.openshift.expose-services=, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, architecture=x86_64, version=17.1.12, release=1761123044, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, description=Red Hat OpenStack Platform 17.1 memcached, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, io.k8s.display-name=Red Hat OpenStack Platform 17.1 memcached, maintainer=OpenStack TripleO Team, com.redhat.component=openstack-memcached-container) Dec 3 09:10:06 np0005543227 systemd[1]: fef138ce9e5002be2390413654571d66aa0a37e5cdd84e3a6c7b8fe67e2c1290.service: Deactivated successfully. Dec 3 09:10:07 np0005543227 systemd[1]: Started /usr/bin/podman healthcheck run 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5. Dec 3 09:10:07 np0005543227 podman[72083]: 2025-12-03 09:10:07.387221931 +0000 UTC m=+0.095060427 container health_status 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, health_status=healthy, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, architecture=x86_64, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, batch=17.1_20251118.1, vcs-type=git, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '87db6a4fa333251e5af3df88ac667383'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, config_id=tripleo_step1, maintainer=OpenStack TripleO Team, tcib_managed=true, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, managed_by=tripleo_ansible, version=17.1.12, vendor=Red Hat, Inc., com.redhat.component=openstack-qdrouterd-container, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, name=rhosp17/openstack-qdrouterd, distribution-scope=public, release=1761123044, io.buildah.version=1.41.4, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, io.openshift.expose-services=, konflux.additional-tags=17.1.12 17.1_20251118.1, build-date=2025-11-18T22:49:46Z, container_name=metrics_qdr, summary=Red Hat OpenStack Platform 17.1 qdrouterd, description=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com) Dec 3 09:10:07 np0005543227 podman[72083]: 2025-12-03 09:10:07.643715019 +0000 UTC m=+0.351553465 container exec_died 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5 (image=registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1, name=metrics_qdr, container_name=metrics_qdr, io.openshift.expose-services=, batch=17.1_20251118.1, release=1761123044, io.k8s.display-name=Red Hat OpenStack Platform 17.1 qdrouterd, url=https://www.redhat.com, cpe=cpe:/a:redhat:rhel_e4s:9.2::appstream, maintainer=OpenStack TripleO Team, konflux.additional-tags=17.1.12 17.1_20251118.1, summary=Red Hat OpenStack Platform 17.1 qdrouterd, baseimage=registry.redhat.io/rhel9-2-els/rhel:9.2@sha256:dd3e22348293588538689be8c51c23472fd4ca53650b3898401947ef9c7e1a05, com.redhat.component=openstack-qdrouterd-container, managed_by=tripleo_ansible, io.openshift.tags=rhosp osp openstack osp-17.1 openstack-qdrouterd, config_id=tripleo_step1, tcib_managed=true, architecture=x86_64, io.buildah.version=1.41.4, build-date=2025-11-18T22:49:46Z, org.opencontainers.image.revision=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, com.redhat.license_terms=https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI, config_data={'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_CONFIG_HASH': '87db6a4fa333251e5af3df88ac667383'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-qdrouterd:17.1', 'net': 'host', 'privileged': False, 'restart': 'always', 'start_order': 1, 'user': 'qdrouterd', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/metrics_qdr.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/metrics_qdr:/var/lib/kolla/config_files/src:ro', '/var/lib/metrics_qdr:/var/lib/qdrouterd:z', '/var/log/containers/metrics_qdr:/var/log/qdrouterd:z', '/etc/pki/tls/certs/metrics_qdr.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/metrics_qdr.crt:ro', '/etc/pki/tls/private/metrics_qdr.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/metrics_qdr.key:ro']}, vcs-ref=7ecaafae6fa9301c7dd5c0fca835eecf10dd147a, description=Red Hat OpenStack Platform 17.1 qdrouterd, distribution-scope=public, vcs-type=git, io.k8s.description=Red Hat OpenStack Platform 17.1 qdrouterd, name=rhosp17/openstack-qdrouterd, version=17.1.12, vendor=Red Hat, Inc.) Dec 3 09:10:07 np0005543227 systemd[1]: 850d6b159cf17030386fed88e822c12a539f93bd22a9838bd42a748f42cc2ad5.service: Deactivated successfully. Dec 3 09:10:09 np0005543227 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:69:03:7e MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.220 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=50887 DF PROTO=TCP SPT=40842 DPT=19885 SEQ=1260354640 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A1E1755310000000001030307) Dec 3 09:10:09 np0005543227 sshd[72113]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:10:09 np0005543227 systemd[1]: Starting User Manager for UID 1000... Dec 3 09:10:09 np0005543227 systemd-logind[36401]: New session 18 of user zuul. Dec 3 09:10:09 np0005543227 systemd[72117]: Queued start job for default target Main User Target. Dec 3 09:10:09 np0005543227 systemd[72117]: Created slice User Application Slice. Dec 3 09:10:09 np0005543227 systemd[72117]: Started Mark boot as successful after the user session has run 2 minutes. Dec 3 09:10:09 np0005543227 systemd[72117]: Started Daily Cleanup of User's Temporary Directories. Dec 3 09:10:09 np0005543227 systemd[72117]: Reached target Paths. Dec 3 09:10:09 np0005543227 systemd[72117]: Reached target Timers. Dec 3 09:10:09 np0005543227 systemd[72117]: Starting D-Bus User Message Bus Socket... Dec 3 09:10:09 np0005543227 systemd[72117]: Starting Create User's Volatile Files and Directories... Dec 3 09:10:09 np0005543227 systemd[72117]: Finished Create User's Volatile Files and Directories. Dec 3 09:10:09 np0005543227 systemd[72117]: Listening on D-Bus User Message Bus Socket. Dec 3 09:10:09 np0005543227 systemd[72117]: Reached target Sockets. Dec 3 09:10:09 np0005543227 systemd[72117]: Reached target Basic System. Dec 3 09:10:09 np0005543227 systemd[72117]: Reached target Main User Target. Dec 3 09:10:09 np0005543227 systemd[72117]: Startup finished in 114ms. Dec 3 09:10:09 np0005543227 systemd[1]: Started User Manager for UID 1000. Dec 3 09:10:09 np0005543227 systemd[1]: Started Session 18 of User zuul. Dec 3 09:10:10 np0005543227 python3[72148]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163e3b-3c83-da4a-51e2-00000000000c-1-overcloudcontroller2 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Dec 3 09:10:10 np0005543227 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:69:03:7e MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.220 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=50888 DF PROTO=TCP SPT=40842 DPT=19885 SEQ=1260354640 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A1E17594D0000000001030307) Dec 3 09:10:10 np0005543227 subscription-manager[72149]: Unregistered machine with identity: 4c3de8c2-9745-4ca3-b732-b062745e47bc Dec 3 09:10:12 np0005543227 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:69:03:7e MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.220 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=50889 DF PROTO=TCP SPT=40842 DPT=19885 SEQ=1260354640 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A1E17614D0000000001030307) Dec 3 09:10:16 np0005543227 systemd[1]: session-18.scope: Deactivated successfully. Dec 3 09:10:16 np0005543227 systemd-logind[36401]: Session 18 logged out. Waiting for processes to exit. Dec 3 09:10:16 np0005543227 systemd-logind[36401]: Removed session 18. Dec 3 09:10:26 np0005543227 systemd[1]: Stopping User Manager for UID 1000... Dec 3 09:10:26 np0005543227 systemd[72117]: Activating special unit Exit the Session... Dec 3 09:10:26 np0005543227 systemd[72117]: Stopped target Main User Target. Dec 3 09:10:26 np0005543227 systemd[72117]: Stopped target Basic System. Dec 3 09:10:26 np0005543227 systemd[72117]: Stopped target Paths. Dec 3 09:10:26 np0005543227 systemd[72117]: Stopped target Sockets. Dec 3 09:10:26 np0005543227 systemd[72117]: Stopped target Timers. Dec 3 09:10:26 np0005543227 systemd[72117]: Stopped Mark boot as successful after the user session has run 2 minutes. Dec 3 09:10:26 np0005543227 systemd[72117]: Stopped Daily Cleanup of User's Temporary Directories. Dec 3 09:10:26 np0005543227 systemd[72117]: Closed D-Bus User Message Bus Socket. Dec 3 09:10:26 np0005543227 systemd[72117]: Stopped Create User's Volatile Files and Directories. Dec 3 09:10:26 np0005543227 systemd[72117]: Removed slice User Application Slice. Dec 3 09:10:26 np0005543227 systemd[72117]: Reached target Shutdown. Dec 3 09:10:26 np0005543227 systemd[72117]: Finished Exit the Session. Dec 3 09:10:26 np0005543227 systemd[72117]: Reached target Exit the Session. Dec 3 09:10:26 np0005543227 systemd[1]: user@1000.service: Deactivated successfully. Dec 3 09:10:26 np0005543227 systemd[1]: Stopped User Manager for UID 1000. Dec 3 09:10:27 np0005543227 sshd[72151]: main: sshd: ssh-rsa algorithm is disabled Dec 3 09:10:27 np0005543227 systemd[1]: Starting User Manager for UID 1000... Dec 3 09:10:27 np0005543227 systemd-logind[36401]: New session 20 of user zuul. Dec 3 09:10:27 np0005543227 systemd[72155]: Queued start job for default target Main User Target.