Dec 3 01:40:57 localhost polkitd[1035]: Loading rules from directory /etc/polkit-1/rules.d Dec 3 01:40:57 localhost polkitd[1035]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 3 01:40:57 localhost polkitd[1035]: Finished loading, compiling and executing 4 rules Dec 3 01:40:57 localhost polkitd[1035]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 3 01:40:58 localhost useradd[1114]: new group: name=cloud-user, GID=1001 Dec 3 01:40:58 localhost useradd[1114]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Dec 3 01:40:58 localhost useradd[1114]: add 'cloud-user' to group 'adm' Dec 3 01:40:58 localhost useradd[1114]: add 'cloud-user' to group 'systemd-journal' Dec 3 01:40:58 localhost useradd[1114]: add 'cloud-user' to shadow group 'adm' Dec 3 01:40:58 localhost useradd[1114]: add 'cloud-user' to shadow group 'systemd-journal' Dec 3 01:41:01 localhost sshd[1128]: Server listening on 0.0.0.0 port 22. Dec 3 01:41:01 localhost sshd[1128]: Server listening on :: port 22. Dec 3 01:41:15 localhost sshd[4153]: Unable to negotiate with 38.102.83.114 port 47224: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Dec 3 01:41:15 localhost sshd[4151]: Connection closed by 38.102.83.114 port 47222 [preauth] Dec 3 01:41:15 localhost sshd[4157]: Unable to negotiate with 38.102.83.114 port 47232: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Dec 3 01:41:15 localhost sshd[4159]: Unable to negotiate with 38.102.83.114 port 47234: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Dec 3 01:41:15 localhost sshd[4161]: Connection reset by 38.102.83.114 port 47238 [preauth] Dec 3 01:41:15 localhost sshd[4155]: Connection closed by 38.102.83.114 port 47226 [preauth] Dec 3 01:41:15 localhost sshd[4165]: fatal: mm_answer_sign: sign: error in libcrypto Dec 3 01:41:15 localhost sshd[4167]: Unable to negotiate with 38.102.83.114 port 47268: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Dec 3 01:41:15 localhost sshd[4163]: Connection closed by 38.102.83.114 port 47254 [preauth] Dec 3 01:41:59 localhost sshd[4172]: Accepted publickey for zuul from 38.102.83.114 port 36692 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Dec 3 01:41:59 localhost systemd[4176]: pam_unix(systemd-user:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 01:41:59 localhost sshd[4172]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 01:42:37 localhost sudo[4775]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-siwidcivlqvtptnlovwyrvdkkraowynz ; /usr/bin/python3 Dec 3 01:42:37 localhost sudo[4775]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:42:38 localhost sudo[4775]: pam_unix(sudo:session): session closed for user root Dec 3 01:42:39 localhost sudo[4823]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lzewvimparugaosutzbqfpmpragslpyt ; /usr/bin/python3 Dec 3 01:42:39 localhost sudo[4823]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:42:39 localhost sudo[4823]: pam_unix(sudo:session): session closed for user root Dec 3 01:42:39 localhost sudo[4866]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xbyosraickdjhhctvvhmgqppjwmqtwep ; /usr/bin/python3 Dec 3 01:42:39 localhost sudo[4866]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:42:39 localhost sudo[4866]: pam_unix(sudo:session): session closed for user root Dec 3 01:42:55 localhost sudo[5260]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xaeowfhiqkcafnjwmfeuhrtgvuuaiqzb ; /usr/bin/python3 Dec 3 01:42:55 localhost sudo[5260]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:42:56 localhost sudo[5260]: pam_unix(sudo:session): session closed for user root Dec 3 01:42:57 localhost sudo[5282]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lbrjqllcdjlrctywthunlxgbiagxdhul ; /usr/bin/python3 Dec 3 01:42:57 localhost sudo[5282]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:42:57 localhost sudo[5282]: pam_unix(sudo:session): session closed for user root Dec 3 01:43:02 localhost sudo[5532]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tojgqlsizxqkipmvcoeibmkvwfjfnblj ; /usr/bin/python3 Dec 3 01:43:02 localhost sudo[5532]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:43:02 localhost sudo[5532]: pam_unix(sudo:session): session closed for user root Dec 3 01:43:02 localhost sudo[5575]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vsgywndrfyoivipdwprkucpjikifnhjf ; /usr/bin/python3 Dec 3 01:43:02 localhost sudo[5575]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:43:02 localhost sudo[5575]: pam_unix(sudo:session): session closed for user root Dec 3 01:43:05 localhost sudo[5669]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xjdcryavzrnpbyyqegxekvtrwlwbmhwp ; /usr/bin/python3 Dec 3 01:43:05 localhost sudo[5669]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:43:05 localhost sudo[5669]: pam_unix(sudo:session): session closed for user root Dec 3 01:43:05 localhost sudo[5712]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mwlvgcjiisfheubjuykbstdffinazfvw ; /usr/bin/python3 Dec 3 01:43:05 localhost sudo[5712]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:43:05 localhost sudo[5712]: pam_unix(sudo:session): session closed for user root Dec 3 01:43:06 localhost sudo[5743]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-antjdvraxsfqlfizebibwikowgztfpds ; /usr/bin/python3 Dec 3 01:43:06 localhost sudo[5743]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:43:07 localhost sudo[5743]: pam_unix(sudo:session): session closed for user root Dec 3 01:43:29 localhost sudo[5797]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lyqjuhntbjazidmnyeynkwhohimshmrw ; /usr/bin/python3 Dec 3 01:43:29 localhost sudo[5797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:43:29 localhost sudo[5797]: pam_unix(sudo:session): session closed for user root Dec 3 01:44:29 localhost sshd[4185]: Received disconnect from 38.102.83.114 port 36692:11: disconnected by user Dec 3 01:44:29 localhost sshd[4185]: Disconnected from user zuul 38.102.83.114 port 36692 Dec 3 01:44:29 localhost sshd[4172]: pam_unix(sshd:session): session closed for user zuul Dec 3 01:47:56 localhost sshd[5810]: Accepted publickey for zuul from 38.102.83.114 port 44118 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 01:47:56 localhost sshd[5810]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 01:48:11 localhost sudo[5875]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-guljgehyfjqntpjalwctyymbxyvgijfz ; OS_CLOUD=vexxhost /usr/bin/python3 Dec 3 01:48:11 localhost sudo[5875]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:48:11 localhost sudo[5875]: pam_unix(sudo:session): session closed for user root Dec 3 01:48:11 localhost sudo[5918]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vhxghqnrqkjrclpobvezxgcxjgwttfqo ; OS_CLOUD=vexxhost /usr/bin/python3 Dec 3 01:48:11 localhost sudo[5918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:48:11 localhost sudo[5918]: pam_unix(sudo:session): session closed for user root Dec 3 01:48:11 localhost sudo[5948]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rxdzqndcdvlmgdvbwrvfuckadtpasbld ; OS_CLOUD=vexxhost /usr/bin/python3 Dec 3 01:48:11 localhost sudo[5948]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:48:12 localhost sudo[5948]: pam_unix(sudo:session): session closed for user root Dec 3 01:49:08 localhost sudo[6097]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-telkwdbsntnyzlaloubtkljbgsxpmpbn ; OS_CLOUD=vexxhost /usr/bin/python3 Dec 3 01:49:08 localhost sudo[6097]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:49:08 localhost sudo[6097]: pam_unix(sudo:session): session closed for user root Dec 3 01:49:08 localhost sudo[6140]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cghifulqddarzhhfyyorqovwsfkdxlej ; OS_CLOUD=vexxhost /usr/bin/python3 Dec 3 01:49:08 localhost sudo[6140]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:49:09 localhost sudo[6140]: pam_unix(sudo:session): session closed for user root Dec 3 01:49:11 localhost sshd[5810]: pam_unix(sshd:session): session closed for user zuul Dec 3 01:54:22 localhost sshd[6160]: Invalid user support from 45.135.232.92 port 59596 Dec 3 01:54:22 localhost sshd[6160]: Connection reset by invalid user support 45.135.232.92 port 59596 [preauth] Dec 3 01:54:24 localhost sshd[6162]: Invalid user admin from 45.135.232.92 port 59600 Dec 3 01:54:24 localhost sshd[6162]: Connection reset by invalid user admin 45.135.232.92 port 59600 [preauth] Dec 3 01:54:26 localhost sshd[6164]: Connection reset by authenticating user root 45.135.232.92 port 59030 [preauth] Dec 3 01:54:27 localhost sshd[6166]: Invalid user user from 45.135.232.92 port 59034 Dec 3 01:54:27 localhost sshd[6166]: Connection reset by invalid user user 45.135.232.92 port 59034 [preauth] Dec 3 01:54:28 localhost sshd[6169]: Connection reset by authenticating user root 45.135.232.92 port 59044 [preauth] Dec 3 01:56:29 localhost sshd[6173]: Accepted publickey for zuul from 38.102.83.114 port 58048 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 01:56:29 localhost sshd[6173]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 01:56:29 localhost sudo[6193]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-byginpizplbsywrbozrdrwwuvqlxscle ; /usr/bin/python3 Dec 3 01:56:29 localhost sudo[6193]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:29 localhost sudo[6193]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:31 localhost sudo[6211]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jfggknsxntzlgwlgchomfxgffvvwyhfe ; /usr/bin/python3 Dec 3 01:56:31 localhost sudo[6211]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:31 localhost sudo[6211]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:31 localhost sudo[6227]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hentbufcqyhnjkqqajbfmjxsilchxcfw ; /usr/bin/python3 Dec 3 01:56:31 localhost sudo[6227]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:31 localhost sudo[6227]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:31 localhost sudo[6243]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-duvjxwncwehrjvmvjfkzesqiyziehtst ; /usr/bin/python3 Dec 3 01:56:31 localhost sudo[6243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:31 localhost sudo[6243]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:31 localhost sudo[6259]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lvzhqpjeoxddegcyqgkrjrncenfzdkfy ; /usr/bin/python3 Dec 3 01:56:32 localhost sudo[6259]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:32 localhost sudo[6259]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:32 localhost sudo[6275]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gjbjnguyjarlpvvkbsohsaejvhnzzzyf ; /usr/bin/python3 Dec 3 01:56:32 localhost sudo[6275]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:32 localhost sudo[6275]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:34 localhost sudo[6323]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-dvjiwdnracogzddlvqkxiybmhammukes ; /usr/bin/python3 Dec 3 01:56:34 localhost sudo[6323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:34 localhost sudo[6323]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:34 localhost sudo[6366]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pbeqwhrmhwzpwtqkeqtdblpyksvirxqf ; /usr/bin/python3 Dec 3 01:56:34 localhost sudo[6366]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:34 localhost sudo[6366]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:35 localhost sudo[6397]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cnfvvdivcthszyxplwszhsexpvofjfll ; /usr/bin/python3 Dec 3 01:56:35 localhost sudo[6397]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:36 localhost sudo[6397]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:37 localhost sudo[6443]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uoezliofysrbhhermjzeryhgxzydneek ; /usr/bin/python3 Dec 3 01:56:37 localhost sudo[6443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:37 localhost sudo[6443]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:38 localhost sudo[6459]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-plpzjwqfpofzumggsqyfurgcjdthysjr ; /usr/bin/python3 Dec 3 01:56:38 localhost sudo[6459]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:39 localhost sudo[6459]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:39 localhost sudo[6477]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fvhczgihwjkhdwcwknqcpsvluoqczfqc ; /usr/bin/python3 Dec 3 01:56:39 localhost sudo[6477]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:39 localhost sudo[6477]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:39 localhost sudo[6495]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xxbgpxjemscvhfngxodxcanzpiaosscn ; /usr/bin/python3 Dec 3 01:56:39 localhost sudo[6495]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:39 localhost sudo[6495]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:39 localhost sudo[6513]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-riqjeebnyonilagdojfchbtcqegiqfal ; /usr/bin/python3 Dec 3 01:56:39 localhost sudo[6513]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:56:39 localhost sudo[6513]: pam_unix(sudo:session): session closed for user root Dec 3 01:56:54 localhost sshd[6173]: pam_unix(sshd:session): session closed for user zuul Dec 3 01:58:15 localhost sshd[6562]: Accepted publickey for zuul from 38.102.83.114 port 57196 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 01:58:15 localhost sshd[6562]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 01:58:16 localhost sudo[6579]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ahbvdtiwfibnmeaqficklccvodebiiyi ; /usr/bin/python3 Dec 3 01:58:16 localhost sudo[6579]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 01:58:21 localhost sudo[6579]: pam_unix(sudo:session): session closed for user root Dec 3 01:59:06 localhost sshd[6681]: Invalid user support from 91.202.233.33 port 21664 Dec 3 01:59:06 localhost sshd[6681]: Connection reset by invalid user support 91.202.233.33 port 21664 [preauth] Dec 3 01:59:07 localhost sshd[6683]: Invalid user admin from 91.202.233.33 port 21680 Dec 3 01:59:07 localhost sshd[6683]: Connection reset by invalid user admin 91.202.233.33 port 21680 [preauth] Dec 3 01:59:09 localhost sshd[6685]: Connection reset by authenticating user root 91.202.233.33 port 53644 [preauth] Dec 3 01:59:11 localhost sshd[6687]: Invalid user user from 91.202.233.33 port 53670 Dec 3 01:59:11 localhost sshd[6687]: Connection reset by invalid user user 91.202.233.33 port 53670 [preauth] Dec 3 01:59:12 localhost sshd[6689]: Connection reset by authenticating user root 91.202.233.33 port 53712 [preauth] Dec 3 01:59:17 localhost sudo[6704]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qvrqxqccyqepzqjztxrxptgmgbrdbwwh ; /usr/bin/python3 Dec 3 01:59:17 localhost sudo[6704]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:00:13 localhost sudo[6704]: pam_unix(sudo:session): session closed for user root Dec 3 02:00:14 localhost sudo[12581]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lgaymolkxozmwlcskwlwzjfphumloejn ; /usr/bin/python3 Dec 3 02:00:14 localhost sudo[12581]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:00:15 localhost sudo[12581]: pam_unix(sudo:session): session closed for user root Dec 3 02:00:17 localhost sshd[6562]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:00:34 localhost sshd[18433]: Unable to negotiate with 38.102.83.147 port 55086: no matching host key type found. Their offer: sk-ssh-ed25519@openssh.com [preauth] Dec 3 02:00:34 localhost sshd[18437]: Connection closed by 38.102.83.147 port 55054 [preauth] Dec 3 02:00:34 localhost sshd[18434]: Connection closed by 38.102.83.147 port 55048 [preauth] Dec 3 02:00:34 localhost sshd[18435]: Unable to negotiate with 38.102.83.147 port 55066: no matching host key type found. Their offer: ssh-ed25519 [preauth] Dec 3 02:00:34 localhost sshd[18436]: Unable to negotiate with 38.102.83.147 port 55072: no matching host key type found. Their offer: sk-ecdsa-sha2-nistp256@openssh.com [preauth] Dec 3 02:00:38 localhost sshd[18443]: Accepted publickey for zuul from 38.102.83.114 port 53410 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:00:38 localhost sshd[18443]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:00:39 localhost sudo[18474]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-omimqqbnyugzthpvfatbcqksmchfpexz ; /usr/bin/python3 Dec 3 02:00:39 localhost sudo[18474]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:00:40 localhost sudo[18474]: pam_unix(sudo:session): session closed for user root Dec 3 02:00:41 localhost sshd[18443]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:01:20 localhost sshd[18492]: Invalid user support from 45.140.17.124 port 37418 Dec 3 02:01:21 localhost sshd[18492]: Connection reset by invalid user support 45.140.17.124 port 37418 [preauth] Dec 3 02:01:22 localhost sshd[18494]: Invalid user admin from 45.140.17.124 port 37426 Dec 3 02:01:22 localhost sshd[18494]: Connection reset by invalid user admin 45.140.17.124 port 37426 [preauth] Dec 3 02:01:23 localhost sshd[18496]: Connection reset by authenticating user root 45.140.17.124 port 37434 [preauth] Dec 3 02:01:24 localhost sshd[18498]: Invalid user user from 45.140.17.124 port 37450 Dec 3 02:01:25 localhost sshd[18498]: Connection reset by invalid user user 45.140.17.124 port 37450 [preauth] Dec 3 02:01:26 localhost sshd[18500]: Connection reset by authenticating user root 45.140.17.124 port 37468 [preauth] Dec 3 02:02:10 localhost sshd[18504]: Accepted publickey for zuul from 38.102.83.114 port 42262 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:02:10 localhost sshd[18504]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:02:10 localhost sudo[18521]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lvzobynzefnlwuxmbhyklnuacxftjcaa ; /usr/bin/python3 Dec 3 02:02:10 localhost sudo[18521]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:02:10 localhost sudo[18521]: pam_unix(sudo:session): session closed for user root Dec 3 02:02:11 localhost sudo[18537]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rmpeqarzwusmetcdobwjwfypnkplkylg ; /usr/bin/python3 Dec 3 02:02:11 localhost sudo[18537]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:02:11 localhost sudo[18537]: pam_unix(sudo:session): session closed for user root Dec 3 02:02:13 localhost sudo[18587]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nlwkidrvarblffcjkcurzpcowpskowcq ; /usr/bin/python3 Dec 3 02:02:13 localhost sudo[18587]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:02:13 localhost sudo[18587]: pam_unix(sudo:session): session closed for user root Dec 3 02:02:13 localhost sudo[18630]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-scsymqogbshghufhauglvaszslzynilr ; /usr/bin/python3 Dec 3 02:02:13 localhost sudo[18630]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:02:13 localhost sudo[18630]: pam_unix(sudo:session): session closed for user root Dec 3 02:02:14 localhost sudo[18692]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tgfjeytemvxtxujbqnvnqlkrceftcbtm ; /usr/bin/python3 Dec 3 02:02:14 localhost sudo[18692]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:02:14 localhost sudo[18692]: pam_unix(sudo:session): session closed for user root Dec 3 02:02:15 localhost sudo[18735]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kbyxkevbpsyekihmbjcwwyyyzlpbksix ; /usr/bin/python3 Dec 3 02:02:15 localhost sudo[18735]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:02:15 localhost sudo[18735]: pam_unix(sudo:session): session closed for user root Dec 3 02:02:17 localhost sudo[18765]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-etuezimsivgslytjivlduwteqxdldnns ; /usr/bin/python3 Dec 3 02:02:17 localhost sudo[18765]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:02:17 localhost sudo[18765]: pam_unix(sudo:session): session closed for user root Dec 3 02:02:22 localhost sshd[18504]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:04:43 localhost sshd[18999]: Accepted publickey for zuul from 38.102.83.147 port 58692 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:04:43 localhost sshd[18999]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:04:55 localhost sshd[18997]: Connection closed by 66.132.153.112 port 11238 [preauth] Dec 3 02:09:43 localhost sshd[19002]: Received disconnect from 38.102.83.147 port 58692:11: disconnected by user Dec 3 02:09:43 localhost sshd[19002]: Disconnected from user zuul 38.102.83.147 port 58692 Dec 3 02:09:43 localhost sshd[18999]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:16:15 localhost sshd[19053]: Accepted publickey for zuul from 38.102.83.114 port 52310 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:16:15 localhost sshd[19053]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:16:28 localhost sudo[19088]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-swmnkzvkomavlnryugrwhzcqzuwimmyj ; /usr/bin/python3 Dec 3 02:16:28 localhost sudo[19088]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:16:31 localhost sudo[19088]: pam_unix(sudo:session): session closed for user root Dec 3 02:16:59 localhost sudo[19106]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-szkabojwqzibuxovnitrtfrvbpwbpkog ; /usr/bin/python3 Dec 3 02:16:59 localhost sudo[19106]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:17:28 localhost sudo[19106]: pam_unix(sudo:session): session closed for user root Dec 3 02:17:34 localhost sudo[19264]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-whanhgmjhbvbrcxpiswimgnaekadblkd ; /usr/bin/python3 Dec 3 02:17:34 localhost sudo[19264]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:17:39 localhost sudo[19264]: pam_unix(sudo:session): session closed for user root Dec 3 02:17:55 localhost sudo[19405]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jlzksqczhwmxdqxdrjzvhinvywsqfcbt ; /usr/bin/python3 Dec 3 02:17:55 localhost sudo[19405]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:18:12 localhost sudo[19405]: pam_unix(sudo:session): session closed for user root Dec 3 02:18:27 localhost sudo[19742]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-yjdkiemzyvabvfbjyjmrattnsdqbnzqd ; /usr/bin/python3 Dec 3 02:18:27 localhost sudo[19742]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:18:37 localhost sshd[19995]: Invalid user user from 78.128.112.74 port 39740 Dec 3 02:18:37 localhost sshd[19995]: Connection closed by invalid user user 78.128.112.74 port 39740 [preauth] Dec 3 02:18:43 localhost sudo[19742]: pam_unix(sudo:session): session closed for user root Dec 3 02:18:59 localhost sudo[20080]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-frrrwtxauvhohttymiizigphccuaorus ; /usr/bin/python3 Dec 3 02:18:59 localhost sudo[20080]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:19:16 localhost sudo[20080]: pam_unix(sudo:session): session closed for user root Dec 3 02:19:29 localhost sudo[20478]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-phtybliojnxjneaulswcgegjeudxkyuk ; /usr/bin/python3 Dec 3 02:19:29 localhost sudo[20478]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:19:31 localhost sudo[20478]: pam_unix(sudo:session): session closed for user root Dec 3 02:19:57 localhost sudo[20496]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vobdavbxccxqchfvfqdgframtjhnnuih ; /usr/bin/python3 Dec 3 02:19:57 localhost sudo[20496]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:20:20 localhost groupadd[20595]: group added to /etc/group: name=unbound, GID=987 Dec 3 02:20:20 localhost groupadd[20595]: group added to /etc/gshadow: name=unbound Dec 3 02:20:20 localhost groupadd[20595]: new group: name=unbound, GID=987 Dec 3 02:20:20 localhost useradd[20602]: new user: name=unbound, UID=987, GID=987, home=/etc/unbound, shell=/sbin/nologin, from=none Dec 3 02:20:20 localhost groupadd[20615]: group added to /etc/group: name=openvswitch, GID=986 Dec 3 02:20:20 localhost groupadd[20615]: group added to /etc/gshadow: name=openvswitch Dec 3 02:20:20 localhost groupadd[20615]: new group: name=openvswitch, GID=986 Dec 3 02:20:20 localhost useradd[20622]: new user: name=openvswitch, UID=986, GID=986, home=/, shell=/sbin/nologin, from=none Dec 3 02:20:20 localhost groupadd[20630]: group added to /etc/group: name=hugetlbfs, GID=985 Dec 3 02:20:20 localhost groupadd[20630]: group added to /etc/gshadow: name=hugetlbfs Dec 3 02:20:20 localhost groupadd[20630]: new group: name=hugetlbfs, GID=985 Dec 3 02:20:20 localhost usermod[20638]: add 'openvswitch' to group 'hugetlbfs' Dec 3 02:20:20 localhost usermod[20638]: add 'openvswitch' to shadow group 'hugetlbfs' Dec 3 02:20:25 localhost sudo[20496]: pam_unix(sudo:session): session closed for user root Dec 3 02:20:51 localhost sudo[21819]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tyckbogceucgkadwekjmttfyehsrsmwa ; /usr/bin/python3 Dec 3 02:20:51 localhost sudo[21819]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:06 localhost sudo[21819]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:07 localhost sudo[21838]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xxtgzniebbnlahjzjvhppebwxotkoxvo ; /usr/bin/python3 Dec 3 02:21:07 localhost sudo[21838]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:07 localhost sudo[21838]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:09 localhost sudo[21886]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cnomhvvqczabhfwpjjkjzwowzolankfa ; /usr/bin/python3 Dec 3 02:21:09 localhost sudo[21886]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:09 localhost sudo[21886]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:10 localhost sudo[21929]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gevktessjlaoluqfqbhuwhzpzmeiprkd ; /usr/bin/python3 Dec 3 02:21:10 localhost sudo[21929]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:10 localhost sudo[21929]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:12 localhost sudo[21959]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mqlpxsiqtykoqkndpkktsmounshgolge ; /usr/bin/python3 Dec 3 02:21:12 localhost sudo[21959]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:13 localhost sudo[21959]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:13 localhost sudo[21980]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vffapdhbdwhvkllokbuutivcgsflbfds ; /usr/bin/python3 Dec 3 02:21:13 localhost sudo[21980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:13 localhost sudo[21980]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:13 localhost sudo[22000]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gkapeyshsfuidiygivduohzymerxngli ; /usr/bin/python3 Dec 3 02:21:13 localhost sudo[22000]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:13 localhost sudo[22000]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:13 localhost sudo[22020]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-piilmcokxgeisfuqllrypmfjfrcukayj ; /usr/bin/python3 Dec 3 02:21:14 localhost sudo[22020]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:14 localhost sudo[22020]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:14 localhost sudo[22040]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bswuvtkragkgdhvyacztxipaewpbufzi ; /usr/bin/python3 Dec 3 02:21:14 localhost sudo[22040]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:14 localhost sudo[22040]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:16 localhost sudo[22060]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ovuvscpnlmnzintbujbaryvwcgvbxhjk ; /usr/bin/python3 Dec 3 02:21:16 localhost sudo[22060]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:17 localhost sudo[22060]: pam_unix(sudo:session): session closed for user root Dec 3 02:21:17 localhost sudo[22233]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-eqmbdjkbyiewirncllovkrfkwsasdegc ; /usr/bin/python3 Dec 3 02:21:17 localhost sudo[22233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:21:18 localhost sudo[22233]: pam_unix(sudo:session): session closed for user root Dec 3 02:22:00 localhost sudo[22400]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jagfmtvnmpkkmsllpwxkkgxawuatkexy ; /usr/bin/python3 Dec 3 02:22:00 localhost sudo[22400]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:22:52 localhost sudo[22400]: pam_unix(sudo:session): session closed for user root Dec 3 02:23:10 localhost sudo[23841]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xtdxwppisfxeaedlyrgizfltiihphkik ; /usr/bin/python3 Dec 3 02:23:10 localhost sudo[23841]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:23:10 localhost sudo[23841]: pam_unix(sudo:session): session closed for user root Dec 3 02:23:35 localhost sshd[19053]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:23:39 localhost sshd[23932]: Accepted publickey for zuul from 38.102.83.114 port 41758 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:23:39 localhost sshd[23932]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:23:40 localhost sshd[23932]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:25:52 localhost sshd[24037]: Accepted publickey for zuul from 38.102.83.114 port 46534 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:25:52 localhost sshd[24037]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:25:52 localhost sudo[24054]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fixpbfgplwxvdyyhuziqlcdlrrbgtoli ; /usr/bin/python3 Dec 3 02:25:52 localhost sudo[24054]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:26:00 localhost groupadd[24119]: group added to /etc/group: name=printadmin, GID=984 Dec 3 02:26:00 localhost groupadd[24119]: group added to /etc/gshadow: name=printadmin Dec 3 02:26:00 localhost groupadd[24119]: new group: name=printadmin, GID=984 Dec 3 02:26:10 localhost sshd[1128]: Received signal 15; terminating. Dec 3 02:26:10 localhost sshd[24195]: Server listening on 0.0.0.0 port 22. Dec 3 02:26:10 localhost sshd[24195]: Server listening on :: port 22. Dec 3 02:26:13 localhost sudo[24054]: pam_unix(sudo:session): session closed for user root Dec 3 02:26:24 localhost sshd[26158]: Connection reset by authenticating user root 45.135.232.92 port 33672 [preauth] Dec 3 02:26:25 localhost sshd[26160]: Invalid user telecomadmin from 45.135.232.92 port 41560 Dec 3 02:26:26 localhost sshd[26160]: Connection reset by invalid user telecomadmin 45.135.232.92 port 41560 [preauth] Dec 3 02:26:27 localhost sshd[26164]: Accepted publickey for root from 192.168.122.11 port 46630 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:27 localhost sshd[26162]: Invalid user user from 45.135.232.92 port 41570 Dec 3 02:26:27 localhost systemd[26168]: pam_unix(systemd-user:session): session opened for user root(uid=0) by (uid=0) Dec 3 02:26:27 localhost sshd[26164]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Dec 3 02:26:27 localhost sshd[26162]: Connection reset by invalid user user 45.135.232.92 port 41570 [preauth] Dec 3 02:26:27 localhost sshd[26183]: Received disconnect from 192.168.122.11 port 46630:11: disconnected by user Dec 3 02:26:27 localhost sshd[26183]: Disconnected from user root 192.168.122.11 port 46630 Dec 3 02:26:27 localhost sshd[26164]: pam_unix(sshd:session): session closed for user root Dec 3 02:26:28 localhost sshd[26199]: Accepted publickey for root from 192.168.122.11 port 46640 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:28 localhost sshd[26199]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Dec 3 02:26:28 localhost sshd[26202]: Received disconnect from 192.168.122.11 port 46640:11: disconnected by user Dec 3 02:26:28 localhost sshd[26202]: Disconnected from user root 192.168.122.11 port 46640 Dec 3 02:26:28 localhost sshd[26199]: pam_unix(sshd:session): session closed for user root Dec 3 02:26:28 localhost sshd[26216]: Accepted publickey for zuul from 192.168.122.11 port 50966 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:28 localhost sshd[26216]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:28 localhost sshd[26220]: Received disconnect from 192.168.122.11 port 50966:11: disconnected by user Dec 3 02:26:28 localhost sshd[26220]: Disconnected from user zuul 192.168.122.11 port 50966 Dec 3 02:26:28 localhost sshd[26216]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:28 localhost sshd[26234]: Accepted publickey for zuul from 192.168.122.11 port 50970 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:28 localhost sshd[26234]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:28 localhost sshd[26237]: Received disconnect from 192.168.122.11 port 50970:11: disconnected by user Dec 3 02:26:28 localhost sshd[26237]: Disconnected from user zuul 192.168.122.11 port 50970 Dec 3 02:26:28 localhost sshd[26234]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:28 localhost sshd[26251]: Accepted publickey for root from 192.168.122.11 port 50980 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:28 localhost sshd[26251]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Dec 3 02:26:28 localhost sshd[26197]: Connection reset by authenticating user root 45.135.232.92 port 41580 [preauth] Dec 3 02:26:28 localhost sshd[26254]: Received disconnect from 192.168.122.11 port 50980:11: disconnected by user Dec 3 02:26:28 localhost sshd[26254]: Disconnected from user root 192.168.122.11 port 50980 Dec 3 02:26:28 localhost sshd[26251]: pam_unix(sshd:session): session closed for user root Dec 3 02:26:29 localhost sshd[26268]: Accepted publickey for zuul from 192.168.122.11 port 50990 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:29 localhost sshd[26268]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:29 localhost sshd[26272]: Received disconnect from 192.168.122.11 port 50990:11: disconnected by user Dec 3 02:26:29 localhost sshd[26272]: Disconnected from user zuul 192.168.122.11 port 50990 Dec 3 02:26:29 localhost sshd[26268]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:29 localhost sshd[26287]: Accepted publickey for zuul from 192.168.122.11 port 50996 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:29 localhost sshd[26287]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:29 localhost sshd[26291]: Received disconnect from 192.168.122.11 port 50996:11: disconnected by user Dec 3 02:26:29 localhost sshd[26291]: Disconnected from user zuul 192.168.122.11 port 50996 Dec 3 02:26:29 localhost sshd[26287]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:29 localhost sshd[26305]: Accepted publickey for zuul from 192.168.122.11 port 51006 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:29 localhost sshd[26305]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:29 localhost sshd[26308]: Received disconnect from 192.168.122.11 port 51006:11: disconnected by user Dec 3 02:26:29 localhost sshd[26308]: Disconnected from user zuul 192.168.122.11 port 51006 Dec 3 02:26:29 localhost sshd[26305]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:29 localhost sshd[26322]: Accepted publickey for zuul from 192.168.122.11 port 51020 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:29 localhost sshd[26322]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:29 localhost sshd[26325]: Received disconnect from 192.168.122.11 port 51020:11: disconnected by user Dec 3 02:26:29 localhost sshd[26325]: Disconnected from user zuul 192.168.122.11 port 51020 Dec 3 02:26:29 localhost sshd[26322]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:29 localhost sshd[26339]: Accepted publickey for zuul from 192.168.122.11 port 51030 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:29 localhost sshd[26339]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:30 localhost sshd[26270]: Invalid user ubnt from 45.135.232.92 port 41584 Dec 3 02:26:30 localhost sshd[26342]: Received disconnect from 192.168.122.11 port 51030:11: disconnected by user Dec 3 02:26:30 localhost sshd[26342]: Disconnected from user zuul 192.168.122.11 port 51030 Dec 3 02:26:30 localhost sshd[26339]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:30 localhost sshd[26356]: Accepted publickey for zuul from 192.168.122.11 port 51040 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:30 localhost sshd[26356]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:30 localhost sshd[26359]: Received disconnect from 192.168.122.11 port 51040:11: disconnected by user Dec 3 02:26:30 localhost sshd[26359]: Disconnected from user zuul 192.168.122.11 port 51040 Dec 3 02:26:30 localhost sshd[26356]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:30 localhost sshd[26270]: Connection reset by invalid user ubnt 45.135.232.92 port 41584 [preauth] Dec 3 02:26:30 localhost sshd[26373]: Accepted publickey for zuul from 192.168.122.11 port 51056 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:30 localhost sshd[26373]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:30 localhost sshd[26376]: Received disconnect from 192.168.122.11 port 51056:11: disconnected by user Dec 3 02:26:30 localhost sshd[26376]: Disconnected from user zuul 192.168.122.11 port 51056 Dec 3 02:26:30 localhost sshd[26373]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:30 localhost sshd[26390]: Accepted publickey for zuul from 192.168.122.11 port 51060 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:30 localhost sshd[26390]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:30 localhost sshd[26393]: Received disconnect from 192.168.122.11 port 51060:11: disconnected by user Dec 3 02:26:30 localhost sshd[26393]: Disconnected from user zuul 192.168.122.11 port 51060 Dec 3 02:26:30 localhost sshd[26390]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:30 localhost sshd[26407]: Accepted publickey for zuul from 192.168.122.11 port 51068 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:30 localhost sshd[26407]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:30 localhost sshd[26410]: Received disconnect from 192.168.122.11 port 51068:11: disconnected by user Dec 3 02:26:30 localhost sshd[26410]: Disconnected from user zuul 192.168.122.11 port 51068 Dec 3 02:26:30 localhost sshd[26407]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:31 localhost sshd[26424]: Accepted publickey for zuul from 192.168.122.11 port 51078 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:31 localhost sshd[26424]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:31 localhost sshd[26427]: Received disconnect from 192.168.122.11 port 51078:11: disconnected by user Dec 3 02:26:31 localhost sshd[26427]: Disconnected from user zuul 192.168.122.11 port 51078 Dec 3 02:26:31 localhost sshd[26424]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:31 localhost sshd[26441]: Accepted publickey for zuul from 192.168.122.11 port 51088 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:31 localhost sshd[26441]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:31 localhost sshd[26444]: Received disconnect from 192.168.122.11 port 51088:11: disconnected by user Dec 3 02:26:31 localhost sshd[26444]: Disconnected from user zuul 192.168.122.11 port 51088 Dec 3 02:26:31 localhost sshd[26441]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:31 localhost sshd[26458]: Accepted publickey for zuul from 192.168.122.11 port 51104 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:31 localhost sshd[26458]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:31 localhost sshd[26461]: Received disconnect from 192.168.122.11 port 51104:11: disconnected by user Dec 3 02:26:31 localhost sshd[26461]: Disconnected from user zuul 192.168.122.11 port 51104 Dec 3 02:26:31 localhost sshd[26458]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:31 localhost sshd[26475]: Accepted publickey for zuul from 192.168.122.11 port 51108 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:31 localhost sshd[26475]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:31 localhost sshd[26478]: Received disconnect from 192.168.122.11 port 51108:11: disconnected by user Dec 3 02:26:31 localhost sshd[26478]: Disconnected from user zuul 192.168.122.11 port 51108 Dec 3 02:26:31 localhost sshd[26475]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:26:31 localhost sshd[26492]: Accepted publickey for root from 192.168.122.11 port 51120 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:32 localhost sshd[26492]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Dec 3 02:26:41 localhost sshd[26495]: Received disconnect from 192.168.122.11 port 51120:11: disconnected by user Dec 3 02:26:41 localhost sshd[26495]: Disconnected from user root 192.168.122.11 port 51120 Dec 3 02:26:41 localhost sshd[26492]: pam_unix(sshd:session): session closed for user root Dec 3 02:26:41 localhost sshd[26705]: Accepted publickey for zuul from 192.168.122.11 port 46598 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 02:26:41 localhost sshd[26705]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 02:26:41 localhost sudo[26722]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/dnf install -y podman python3-tripleoclient util-linux lvm2 Dec 3 02:26:41 localhost sudo[26722]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:27:03 localhost sshd[27038]: error: kex_exchange_identification: Connection closed by remote host Dec 3 02:27:03 localhost sshd[27038]: Connection closed by 45.148.10.240 port 40902 Dec 3 02:27:13 localhost sshd[24040]: Received disconnect from 38.102.83.114 port 46534:11: disconnected by user Dec 3 02:27:13 localhost sshd[24040]: Disconnected from user zuul 38.102.83.114 port 46534 Dec 3 02:27:13 localhost sshd[24037]: pam_unix(sshd:session): session closed for user zuul Dec 3 02:28:14 localhost groupadd[27692]: group added to /etc/group: name=puppet, GID=52 Dec 3 02:28:14 localhost groupadd[27692]: group added to /etc/gshadow: name=puppet Dec 3 02:28:14 localhost groupadd[27692]: new group: name=puppet, GID=52 Dec 3 02:28:14 localhost useradd[27699]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Dec 3 02:28:23 localhost groupadd[27717]: group added to /etc/group: name=heat, GID=187 Dec 3 02:28:23 localhost groupadd[27717]: group added to /etc/gshadow: name=heat Dec 3 02:28:23 localhost groupadd[27717]: new group: name=heat, GID=187 Dec 3 02:28:23 localhost useradd[27724]: new user: name=heat, UID=187, GID=187, home=/var/lib/heat, shell=/sbin/nologin, from=none Dec 3 02:28:30 localhost sudo[26722]: pam_unix(sudo:session): session closed for user root Dec 3 02:28:30 localhost sudo[30333]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hostnamectl set-hostname undercloud.ooo.test Dec 3 02:28:30 localhost sudo[30333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:28:30 localhost sudo[30333]: pam_unix(sudo:session): session closed for user root Dec 3 02:28:30 localhost sudo[30337]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hostnamectl set-hostname undercloud.ooo.test --transient Dec 3 02:28:30 localhost sudo[30337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:28:30 localhost sudo[30337]: pam_unix(sudo:session): session closed for user root Dec 3 02:28:32 localhost sudo[30364]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/mkdir -p /etc/os-net-config Dec 3 02:28:32 localhost sudo[30364]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:28:32 localhost sudo[30364]: pam_unix(sudo:session): session closed for user root Dec 3 02:28:32 localhost sudo[30368]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/tee /etc/cloud/cloud.cfg.d/99-edpm-disable-network-config.cfg Dec 3 02:28:32 localhost sudo[30368]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:28:32 localhost sudo[30368]: pam_unix(sudo:session): session closed for user root Dec 3 02:28:32 localhost sudo[30371]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/systemctl enable network Dec 3 02:28:32 localhost sudo[30371]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:28:32 localhost sudo[30371]: pam_unix(sudo:session): session closed for user root Dec 3 02:28:32 localhost sudo[30410]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/cp /tmp/net_config.yaml /etc/os-net-config/config.yaml Dec 3 02:28:32 localhost sudo[30410]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:28:32 localhost sudo[30410]: pam_unix(sudo:session): session closed for user root Dec 3 02:28:32 localhost sudo[30413]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/os-net-config -c /etc/os-net-config/config.yaml Dec 3 02:28:32 localhost sudo[30413]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:28:33 localhost sudo[30413]: pam_unix(sudo:session): session closed for user root Dec 3 02:28:34 localhost sudo[30433]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hostnamectl set-hostname undercloud.ooo.test Dec 3 02:28:34 localhost sudo[30433]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:28:34 localhost sudo[30433]: pam_unix(sudo:session): session closed for user root Dec 3 02:28:34 localhost sudo[30437]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/openstack tripleo deploy --standalone --standalone-role Undercloud --stack undercloud --local-domain=ooo.test --local-ip=192.168.122.100/24 --templates=/usr/share/openstack-tripleo-heat-templates --networks-file=/usr/share/openstack-tripleo-heat-templates/network_data_undercloud.yaml --heat-native -e /usr/share/openstack-tripleo-heat-templates/environments/undercloud.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/use-dns-for-vips.yaml -e /home/zuul/containers-prepare-parameters.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/services/masquerade-networks.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/services/undercloud-remove-novajoin.yaml -e Dec 3 02:28:34 localhost sudo[30437]: zuul : (command continued) /usr/share/openstack-tripleo-heat-templates/environments/disable-telemetry.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/public-tls-undercloud.yaml --public-virtual-ip 192.168.122.99 --control-virtual-ip 192.168.122.99 -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/tls-endpoints-public-ip.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/services/undercloud-haproxy.yaml --deployment-user zuul --output-dir=/home/zuul/tripleo-deploy/undercloud -e /home/zuul/tripleo-deploy/undercloud/tripleo-config-generated-env-files/undercloud_parameters.yaml --hieradata-override=/home/zuul/hieradata_overrides_undercloud.yaml -e /home/zuul/undercloud-parameter-defaults.yaml --log-file=install-undercloud.log -e /usr/share/openstack-tripleo-heat-templates/undercloud-stack-vstate-dropin.yaml Dec 3 02:28:34 localhost sudo[30437]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 02:28:40 localhost sudo[30455]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R zuul /home/zuul/tripleo-deploy/undercloud/tripleo-undercloud-passwords.yaml Dec 3 02:28:40 localhost sudo[30455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 02:28:40 localhost sudo[30455]: pam_unix(sudo:session): session closed for user root Dec 3 02:29:04 localhost sshd[30461]: Invalid user sol from 45.148.10.240 port 60950 Dec 3 02:29:04 localhost sshd[30461]: Connection closed by invalid user sol 45.148.10.240 port 60950 [preauth] Dec 3 02:30:37 localhost sshd[30465]: Connection reset by authenticating user root 91.202.233.33 port 29672 [preauth] Dec 3 02:30:38 localhost sshd[30467]: Invalid user telecomadmin from 91.202.233.33 port 29678 Dec 3 02:30:38 localhost sshd[30467]: Connection reset by invalid user telecomadmin 91.202.233.33 port 29678 [preauth] Dec 3 02:30:39 localhost sshd[30469]: Invalid user user from 91.202.233.33 port 33872 Dec 3 02:30:39 localhost sshd[30469]: Connection reset by invalid user user 91.202.233.33 port 33872 [preauth] Dec 3 02:30:42 localhost sshd[30471]: Connection reset by authenticating user root 91.202.233.33 port 33888 [preauth] Dec 3 02:30:43 localhost sshd[30473]: Invalid user ubnt from 91.202.233.33 port 33892 Dec 3 02:30:43 localhost sshd[30473]: Connection reset by invalid user ubnt 91.202.233.33 port 33892 [preauth] Dec 3 02:31:05 localhost sshd[30475]: Invalid user solana from 45.148.10.240 port 33570 Dec 3 02:31:05 localhost sshd[30475]: Connection closed by invalid user solana 45.148.10.240 port 33570 [preauth] Dec 3 02:32:53 localhost groupadd[32614]: group added to /etc/group: name=apache, GID=48 Dec 3 02:32:53 localhost groupadd[32614]: group added to /etc/gshadow: name=apache Dec 3 02:32:53 localhost groupadd[32614]: new group: name=apache, GID=48 Dec 3 02:32:53 localhost useradd[32621]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Dec 3 02:33:15 localhost sshd[33472]: Invalid user sol from 45.148.10.240 port 57284 Dec 3 02:33:15 localhost sshd[33472]: Connection closed by invalid user sol 45.148.10.240 port 57284 [preauth] Dec 3 02:33:39 localhost sshd[33850]: Connection reset by authenticating user root 45.140.17.124 port 44886 [preauth] Dec 3 02:33:40 localhost sshd[33903]: Invalid user telecomadmin from 45.140.17.124 port 38186 Dec 3 02:33:41 localhost sshd[33903]: Connection reset by invalid user telecomadmin 45.140.17.124 port 38186 [preauth] Dec 3 02:33:42 localhost sshd[33907]: Invalid user user from 45.140.17.124 port 38192 Dec 3 02:33:42 localhost sshd[33907]: Connection reset by invalid user user 45.140.17.124 port 38192 [preauth] Dec 3 02:33:44 localhost sshd[33919]: Connection reset by authenticating user root 45.140.17.124 port 38198 [preauth] Dec 3 02:33:44 localhost sshd[33924]: Invalid user ubnt from 45.140.17.124 port 38210 Dec 3 02:33:45 localhost sshd[33924]: Connection reset by invalid user ubnt 45.140.17.124 port 38210 [preauth] Dec 3 02:34:02 localhost sshd[24195]: Received signal 15; terminating. Dec 3 02:34:02 localhost sshd[34161]: Server listening on 0.0.0.0 port 22. Dec 3 02:34:02 localhost sshd[34161]: Server listening on :: port 22. Dec 3 07:35:15 undercloud sshd[35610]: Invalid user ubuntu from 45.148.10.240 port 50756 Dec 3 07:35:15 undercloud sshd[35610]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:35:15 undercloud sshd[35610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:35:18 undercloud sshd[35610]: Failed password for invalid user ubuntu from 45.148.10.240 port 50756 ssh2 Dec 3 07:35:20 undercloud sshd[35610]: Connection closed by invalid user ubuntu 45.148.10.240 port 50756 [preauth] Dec 3 07:37:08 undercloud runuser[39681]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Dec 3 07:37:09 undercloud runuser[39681]: pam_unix(runuser:session): session closed for user rabbitmq Dec 3 07:37:09 undercloud runuser[39826]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Dec 3 07:37:10 undercloud runuser[39826]: pam_unix(runuser:session): session closed for user rabbitmq Dec 3 07:37:19 undercloud sshd[40439]: Invalid user ubuntu from 45.148.10.240 port 50912 Dec 3 07:37:19 undercloud sshd[40439]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:37:19 undercloud sshd[40439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:37:20 undercloud sshd[40504]: error: kex_exchange_identification: client sent invalid protocol identifier "GET / HTTP/1.1" Dec 3 07:37:20 undercloud sshd[40504]: banner exchange: Connection from 165.154.204.47 port 53478: invalid format Dec 3 07:37:20 undercloud sudo[40673]: memcached : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:37:20 undercloud sudo[40673]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42457) Dec 3 07:37:21 undercloud sudo[40673]: pam_unix(sudo:session): session closed for user root Dec 3 07:37:21 undercloud sshd[40439]: Failed password for invalid user ubuntu from 45.148.10.240 port 50912 ssh2 Dec 3 07:37:21 undercloud sshd[40439]: Connection closed by invalid user ubuntu 45.148.10.240 port 50912 [preauth] Dec 3 07:37:21 undercloud sudo[40895]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:37:21 undercloud sudo[40895]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:37:22 undercloud sudo[40895]: pam_unix(sudo:session): session closed for user root Dec 3 07:37:22 undercloud sudo[41032]: rabbitmq : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:37:22 undercloud sudo[41032]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42439) Dec 3 07:37:22 undercloud sudo[41032]: pam_unix(sudo:session): session closed for user root Dec 3 07:38:14 undercloud runuser[44208]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Dec 3 07:38:15 undercloud runuser[44208]: pam_unix(runuser:session): session closed for user rabbitmq Dec 3 07:38:15 undercloud runuser[44315]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Dec 3 07:38:16 undercloud runuser[44315]: pam_unix(runuser:session): session closed for user rabbitmq Dec 3 07:38:17 undercloud runuser[44462]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Dec 3 07:38:17 undercloud runuser[44462]: pam_unix(runuser:session): session closed for user rabbitmq Dec 3 07:38:18 undercloud runuser[44561]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Dec 3 07:38:18 undercloud runuser[44561]: pam_unix(runuser:session): session closed for user rabbitmq Dec 3 07:38:18 undercloud runuser[44615]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Dec 3 07:38:19 undercloud runuser[44615]: pam_unix(runuser:session): session closed for user rabbitmq Dec 3 07:38:44 undercloud sudo[45653]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:38:44 undercloud sudo[45653]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:38:44 undercloud sudo[45657]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:38:44 undercloud sudo[45657]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:38:44 undercloud sudo[45653]: pam_unix(sudo:session): session closed for user root Dec 3 07:38:44 undercloud sudo[45657]: pam_unix(sudo:session): session closed for user root Dec 3 07:38:44 undercloud sudo[45697]: root : PWD=/ ; USER=keystone ; COMMAND=/usr/bin/keystone-manage db_sync Dec 3 07:38:44 undercloud sudo[45697]: pam_unix(sudo:session): session opened for user keystone(uid=42425) by (uid=0) Dec 3 07:38:54 undercloud sudo[45697]: pam_unix(sudo:session): session closed for user keystone Dec 3 07:38:55 undercloud sudo[46122]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:38:55 undercloud sudo[46122]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:38:56 undercloud sudo[46122]: pam_unix(sudo:session): session closed for user root Dec 3 07:38:56 undercloud su[46174]: pam_unix(su:session): session opened for user ironic(uid=42422) by (uid=0) Dec 3 07:38:56 undercloud su[46174]: pam_lastlog(su:session): file /var/log/lastlog created Dec 3 07:38:56 undercloud su[46174]: pam_lastlog(su:session): unable to open /var/log/btmp: No such file or directory Dec 3 07:38:58 undercloud su[46174]: pam_unix(su:session): session closed for user ironic Dec 3 07:38:59 undercloud sudo[46490]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:38:59 undercloud sudo[46490]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:38:59 undercloud sudo[46502]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:38:59 undercloud sudo[46502]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:38:59 undercloud sudo[46506]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:38:59 undercloud sudo[46490]: pam_unix(sudo:session): session closed for user root Dec 3 07:38:59 undercloud sudo[46502]: pam_unix(sudo:session): session closed for user root Dec 3 07:38:59 undercloud systemd[46555]: pam_unix(systemd-user:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:38:59 undercloud su[46637]: pam_unix(su:session): session opened for user ironic-inspector(uid=42461) by (uid=0) Dec 3 07:38:59 undercloud su[46637]: pam_lastlog(su:session): file /var/log/lastlog created Dec 3 07:38:59 undercloud su[46637]: pam_lastlog(su:session): unable to open /var/log/btmp: No such file or directory Dec 3 07:38:59 undercloud sudo[46506]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:38:59 undercloud sudo[46506]: pam_unix(sudo:session): session closed for user root Dec 3 07:39:00 undercloud su[46637]: pam_unix(su:session): session closed for user ironic-inspector Dec 3 07:39:25 undercloud sshd[47275]: Invalid user sol from 45.148.10.240 port 55632 Dec 3 07:39:25 undercloud sshd[47275]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:39:25 undercloud sshd[47275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:39:27 undercloud sshd[47275]: Failed password for invalid user sol from 45.148.10.240 port 55632 ssh2 Dec 3 07:39:28 undercloud sshd[47275]: Connection closed by invalid user sol 45.148.10.240 port 55632 [preauth] Dec 3 07:41:19 undercloud sudo[49737]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:19 undercloud sudo[49737]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:41:19 undercloud sudo[49742]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:19 undercloud sudo[49742]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:41:19 undercloud sudo[49737]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:19 undercloud sudo[49742]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:20 undercloud sudo[50075]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:20 undercloud sudo[50075]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:41:20 undercloud sudo[50104]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:20 undercloud sudo[50104]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:41:20 undercloud sudo[50075]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:20 undercloud sudo[50128]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:20 undercloud sudo[50128]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:41:20 undercloud sudo[50104]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:20 undercloud sudo[50128]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:20 undercloud sudo[50166]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:20 undercloud sudo[50166]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:41:20 undercloud sudo[50166]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:21 undercloud sudo[50454]: ironic : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:21 undercloud sudo[50458]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:21 undercloud sudo[50458]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:41:21 undercloud systemd[50469]: pam_unix(systemd-user:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:41:21 undercloud sudo[50458]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:21 undercloud sudo[50454]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42422) Dec 3 07:41:21 undercloud sudo[50454]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:21 undercloud sudo[50574]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/ml2/openvswitch_agent.ini --config-dir /etc/neutron/conf.d/neutron-openvswitch-agent --privsep_context neutron.privileged.ovs_vsctl_cmd --privsep_sock_path /tmp/tmp0ukvdsro/privsep.sock Dec 3 07:41:21 undercloud sudo[50574]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:41:22 undercloud sudo[50621]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:22 undercloud sudo[50621]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:41:22 undercloud sudo[50621]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:22 undercloud sudo[50574]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:22 undercloud sudo[50707]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/l3_agent.ini --config-dir /etc/neutron/conf.d/neutron-l3-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpeqai4z4c/privsep.sock Dec 3 07:41:22 undercloud sudo[50707]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:41:23 undercloud sudo[50748]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:23 undercloud sudo[50748]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:41:23 undercloud sudo[50748]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:23 undercloud sudo[50707]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:23 undercloud sudo[50890]: ironic-inspector : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:23 undercloud sudo[50890]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42461) Dec 3 07:41:23 undercloud sudo[50890]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:24 undercloud sudo[50988]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Dec 3 07:41:24 undercloud sudo[50988]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:41:24 undercloud sudo[50988]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:27 undercloud sudo[51095]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/ml2/openvswitch_agent.ini --config-dir /etc/neutron/conf.d/common --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpx4i8ek_h/privsep.sock Dec 3 07:41:27 undercloud sudo[51095]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:41:27 undercloud sshd[51089]: Invalid user solana from 45.148.10.240 port 45658 Dec 3 07:41:27 undercloud sshd[51089]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:41:27 undercloud sshd[51089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:41:27 undercloud sudo[51095]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:28 undercloud sudo[51122]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/ml2/openvswitch_agent.ini --config-dir /etc/neutron/conf.d/common --privsep_context neutron.privileged.ovs_vsctl_cmd --privsep_sock_path /tmp/tmpvetnszso/privsep.sock Dec 3 07:41:28 undercloud sudo[51122]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:41:29 undercloud sudo[51122]: pam_unix(sudo:session): session closed for user root Dec 3 07:41:29 undercloud sshd[51089]: Failed password for invalid user solana from 45.148.10.240 port 45658 ssh2 Dec 3 07:41:29 undercloud sshd[51089]: Connection closed by invalid user solana 45.148.10.240 port 45658 [preauth] Dec 3 07:42:52 undercloud sudo[54603]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/dhcp_agent.ini --config-dir /etc/neutron/conf.d/neutron-dhcp-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpoev1ywlx/privsep.sock Dec 3 07:42:52 undercloud sudo[54603]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:42:53 undercloud sudo[54603]: pam_unix(sudo:session): session closed for user root Dec 3 07:42:54 undercloud sudo[54804]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf Dec 3 07:42:54 undercloud sudo[54804]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Dec 3 07:42:59 undercloud sudo[54981]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R zuul /home/zuul/tripleo-deploy/undercloud/tripleo-heat-installer-templates Dec 3 07:42:59 undercloud sudo[54981]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:42:59 undercloud sudo[54981]: pam_unix(sudo:session): session closed for user root Dec 3 07:42:59 undercloud sudo[54990]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R zuul /home/zuul/tripleo-deploy/undercloud/undercloud-ansible-vs2oc1su Dec 3 07:42:59 undercloud sudo[54990]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:42:59 undercloud sudo[54990]: pam_unix(sudo:session): session closed for user root Dec 3 07:42:59 undercloud sudo[54997]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R zuul /home/zuul/.tripleo Dec 3 07:42:59 undercloud sudo[54997]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:42:59 undercloud sudo[54997]: pam_unix(sudo:session): session closed for user root Dec 3 07:42:59 undercloud sudo[55006]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/cp /etc/openstack/clouds.yaml /home/zuul/.config/openstack Dec 3 07:42:59 undercloud sudo[55006]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:42:59 undercloud sudo[55006]: pam_unix(sudo:session): session closed for user root Dec 3 07:42:59 undercloud sudo[55018]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chmod 0600 /home/zuul/.config/openstack/clouds.yaml Dec 3 07:42:59 undercloud sudo[55018]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:42:59 undercloud sudo[55018]: pam_unix(sudo:session): session closed for user root Dec 3 07:43:00 undercloud sudo[55021]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R 1000:1000 /home/zuul/.config Dec 3 07:43:00 undercloud sudo[55021]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Dec 3 07:43:00 undercloud sudo[55021]: pam_unix(sudo:session): session closed for user root Dec 3 07:43:00 undercloud sudo[30437]: pam_unix(sudo:session): session closed for user root Dec 3 07:43:30 undercloud sudo[55730]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/mkdir /tmp/ipa-data Dec 3 07:43:30 undercloud sudo[55730]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:43:30 undercloud sudo[55730]: pam_unix(sudo:session): session closed for user root Dec 3 07:43:30 undercloud sudo[55733]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman run -d --name freeipa-server-container --sysctl net.ipv6.conf.lo.disable_ipv6=0 --security-opt seccomp=unconfined --ip 10.255.255.25 -e IPA_SERVER_IP=10.255.255.25 -e PASSWORD=fce95318204114530f31f885c9df588f -h ipa.ooo.test -p 53:53/udp -p 53:53 -p 80:80 -p 443:443 -p 389:389 -p 636:636 -p 88:88 -p 464:464 -p 88:88/udp -p 464:464/udp --read-only --tmpfs /run --tmpfs /tmp -v /sys/fs/cgroup:/sys/fs/cgroup:ro -v /tmp/ipa-data:/data:Z quay.io/freeipa/freeipa-server:fedora-43 no-exit -U -r OOO.TEST --setup-dns --no-reverse --no-ntp --no-dnssec-validation --auto-forwarders Dec 3 07:43:30 undercloud sudo[55733]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:43:37 undercloud sshd[55935]: Invalid user solana from 45.148.10.240 port 59736 Dec 3 07:43:37 undercloud sshd[55935]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:43:37 undercloud sshd[55935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:43:39 undercloud sshd[55935]: Failed password for invalid user solana from 45.148.10.240 port 59736 ssh2 Dec 3 07:43:39 undercloud sshd[55935]: Connection closed by invalid user solana 45.148.10.240 port 59736 [preauth] Dec 3 07:43:57 undercloud sudo[55733]: pam_unix(sudo:session): session closed for user root Dec 3 07:43:57 undercloud sudo[57203]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/tail -F /tmp/ipa-data/var/log/ipaserver-install.log Dec 3 07:43:57 undercloud sudo[57203]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:45:52 undercloud sshd[63747]: Invalid user sol from 45.148.10.240 port 43852 Dec 3 07:45:52 undercloud sshd[63747]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:45:52 undercloud sshd[63747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:45:54 undercloud sshd[63747]: Failed password for invalid user sol from 45.148.10.240 port 43852 ssh2 Dec 3 07:45:55 undercloud sshd[63747]: Connection closed by invalid user sol 45.148.10.240 port 43852 [preauth] Dec 3 07:48:01 undercloud sshd[68844]: Invalid user sol from 45.148.10.240 port 50854 Dec 3 07:48:01 undercloud sshd[68844]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:48:01 undercloud sshd[68844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:48:03 undercloud sshd[68844]: Failed password for invalid user sol from 45.148.10.240 port 50854 ssh2 Dec 3 07:48:04 undercloud sshd[68844]: Connection closed by invalid user sol 45.148.10.240 port 50854 [preauth] Dec 3 07:49:08 undercloud sudo[70803]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/mv ipa_resolv.conf /etc/resolv.conf Dec 3 07:49:08 undercloud sudo[70803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:49:08 undercloud sudo[70803]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:09 undercloud sudo[57203]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:13 undercloud sshd[71003]: Accepted publickey for zuul from 192.168.122.100 port 56286 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 07:49:13 undercloud sshd[71003]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 07:49:13 undercloud sudo[71124]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zjmscwyzkdsgdjjofpdijlxswnwzjvoc ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748153.4226186-71001-234355132635378/AnsiballZ_setup.py Dec 3 07:49:13 undercloud sudo[71124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:16 undercloud sudo[71124]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:17 undercloud sudo[71418]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jhwceuimnknqajjfwxnjivikpreyfulk ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748157.046185-71333-30063435981172/AnsiballZ_dnf.py Dec 3 07:49:17 undercloud sudo[71418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:20 undercloud sudo[71418]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:21 undercloud sudo[71657]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tgpfvfsegwhirkdoruswylcnnruvdtof ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748161.2952414-71572-94315873943005/AnsiballZ_ipaclient_test.py Dec 3 07:49:21 undercloud sudo[71657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:22 undercloud sudo[71657]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:23 undercloud sudo[71788]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hiukzzghwgyilivedvgsaeujkzzffksl ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748162.8495927-71707-8553135053676/AnsiballZ_file.py Dec 3 07:49:23 undercloud sudo[71788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:23 undercloud sudo[71788]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:23 undercloud sudo[71892]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-riwktmczrzpgggxhcltbsrnsrpaycutm ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748163.563365-71807-197813478567829/AnsiballZ_ipaclient_setup_ntp.py Dec 3 07:49:23 undercloud sudo[71892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:31 undercloud sudo[71892]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:31 undercloud sudo[72134]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rwnlljmpcremqqjvpuojsyjvnbgxwsqu ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748171.567589-72049-133102125332774/AnsiballZ_ipaclient_test_keytab.py Dec 3 07:49:31 undercloud sudo[72134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:32 undercloud sudo[72134]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:34 undercloud sudo[72272]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-deeeqqqefmydjmxfxhpdkzaekdnkgibb ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748173.8117685-72187-19490799557605/AnsiballZ_ipaclient_set_hostname.py Dec 3 07:49:34 undercloud sudo[72272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:35 undercloud sudo[72272]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:35 undercloud sudo[72604]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nlyutxqnyknjkxvtlgqvrgvhuxbtkdlg ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748175.2722602-72523-26647915775909/AnsiballZ_ipaclient_temp_krb5.py Dec 3 07:49:35 undercloud sudo[72604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:36 undercloud sudo[72604]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:36 undercloud sudo[72717]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wxxshbijteyzmyqcfkzmbhgxiplespdk ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748176.5886195-72632-261361006634970/AnsiballZ_ipaclient_join.py Dec 3 07:49:37 undercloud sudo[72717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:38 undercloud sudo[72717]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:39 undercloud sudo[72907]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-onewtslnihgsbzhbrbpmzlzjbhgwnwnn ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748179.1422253-72826-154642444412880/AnsiballZ_ipaclient_ipa_conf.py Dec 3 07:49:39 undercloud sudo[72907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:40 undercloud sudo[72907]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:40 undercloud sudo[73012]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-raxjgkyfeoxukxkjuqknqqvmelvjdghx ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748180.335025-72931-127877547823336/AnsiballZ_ipaclient_setup_sssd.py Dec 3 07:49:40 undercloud sudo[73012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:41 undercloud sudo[73012]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:41 undercloud sudo[73117]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kxmjftwhlzamuprhpoysidlbplpxlgyh ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748181.4901612-73036-106859590241927/AnsiballZ_ipaclient_api.py Dec 3 07:49:41 undercloud sudo[73117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:44 undercloud sudo[73117]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:45 undercloud sudo[73272]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xhfgfanqpiyyzyggzqsfvdzicfejteme ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748184.736111-73191-154130704466558/AnsiballZ_ipaclient_setup_nss.py Dec 3 07:49:45 undercloud sudo[73272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:50 undercloud sudo[73272]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:50 undercloud sudo[73602]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ixjxsxqysahpgybmceieqiylvsfgupyh ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748190.5647948-73519-144866201387470/AnsiballZ_ipaclient_setup_ssh.py Dec 3 07:49:50 undercloud sudo[73602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:51 undercloud sshd[34161]: Received signal 15; terminating. Dec 3 07:49:51 undercloud sshd[73618]: Server listening on 0.0.0.0 port 22. Dec 3 07:49:51 undercloud sshd[73618]: Server listening on :: port 22. Dec 3 07:49:51 undercloud sudo[73602]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:52 undercloud sudo[73729]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cmgayyfkziaikszuvgdroudbpbgvmqbd ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748191.8207018-73638-11450443465765/AnsiballZ_ipaclient_setup_automount.py Dec 3 07:49:52 undercloud sudo[73729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:52 undercloud sudo[73729]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:53 undercloud sudo[73867]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vfphwsscrjkrcwvijbwnooixpraztxso ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748193.017049-73776-113475604836813/AnsiballZ_ipaclient_setup_nis.py Dec 3 07:49:53 undercloud sudo[73867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:54 undercloud sudo[73867]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:54 undercloud sudo[74031]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ftdmvzulpdgrrxlvxzdrxtozajdjhzpp ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748194.6315804-73940-201350929877296/AnsiballZ_file.py Dec 3 07:49:54 undercloud sudo[74031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:55 undercloud sudo[74031]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:55 undercloud sudo[74147]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-azyetipdjmwxicksywjbqnkznbbajbwi ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748195.368146-74052-101469181358392/AnsiballZ_ipaclient_setup_krb5.py Dec 3 07:49:55 undercloud sudo[74147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:56 undercloud sudo[74147]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:57 undercloud sudo[74268]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qddvppbdbfthprtsikqyqdjnhgcdgfzk ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748196.6271265-74177-180694464387760/AnsiballZ_ipaclient_setup_certmonger.py Dec 3 07:49:57 undercloud sudo[74268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:57 undercloud sudo[74268]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:58 undercloud sudo[74425]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-soguqmpamzwasqjmdtdznwtzwesfhooq ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748197.9005048-74334-162524200361199/AnsiballZ_file.py Dec 3 07:49:58 undercloud sudo[74425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:58 undercloud sudo[74425]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:58 undercloud sudo[74541]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vsphsmdxipxbbghnqxlohmjdxwtbnfxx ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748198.5135884-74446-119911128144509/AnsiballZ_file.py Dec 3 07:49:58 undercloud sudo[74541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:58 undercloud sudo[74541]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:59 undercloud sudo[74655]: zuul : TTY=pts/1 ; PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-sjbjditpmwttbwukucvphjpeksduippa ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748199.1479099-74564-198343701454271/AnsiballZ_file.py Dec 3 07:49:59 undercloud sudo[74655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul(uid=1000) Dec 3 07:49:59 undercloud sudo[74655]: pam_unix(sudo:session): session closed for user root Dec 3 07:49:59 undercloud sudo[74695]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-amizloexpozxkuuyimrpnubbgnqsanwv ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748199.9095078-74683-135952188336711/AnsiballZ_setup.py Dec 3 07:49:59 undercloud sudo[74695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:02 undercloud sudo[74695]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:03 undercloud sudo[74903]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-syheilagaetofhakyizkiemkownglxtw ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748203.1719015-74891-53207953057062/AnsiballZ_user.py Dec 3 07:50:03 undercloud sudo[74903]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:03 undercloud useradd[74908]: new group: name=tripleo-admin, GID=1002 Dec 3 07:50:03 undercloud useradd[74908]: new user: name=tripleo-admin, UID=1002, GID=1002, home=/home/tripleo-admin, shell=/bin/bash, from=none Dec 3 07:50:03 undercloud sudo[74903]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:04 undercloud sudo[74934]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xepioiftbebtzwinaippqvfaupmvwopa ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748203.9396894-74922-125884363941865/AnsiballZ_stat.py Dec 3 07:50:04 undercloud sudo[74934]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:04 undercloud sudo[74934]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:04 undercloud sudo[74942]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mmtqhnjoltrsksawvayjjmfkzqclgeov ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748203.9396894-74922-125884363941865/AnsiballZ_copy.py Dec 3 07:50:04 undercloud sudo[74942]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:04 undercloud sudo[74942]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:04 undercloud sudo[74964]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pylukkdpgnqvignmmsgzrlsqhpvsrosr ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748204.7547798-74952-186214194739350/AnsiballZ_file.py Dec 3 07:50:04 undercloud sudo[74964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:05 undercloud sudo[74964]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:05 undercloud sudo[75246]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pwmqzovpaaashtuinanewfysxkuhnnlu ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748205.0765312-75171-237325877145385/AnsiballZ_file.py Dec 3 07:50:05 undercloud sudo[75246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:05 undercloud sudo[75246]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:05 undercloud sudo[75336]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-akhyanzwaraflaarsdpchegynzghvssv ; /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748205.379982-75324-223860518270068/AnsiballZ_file.py Dec 3 07:50:05 undercloud sudo[75336]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:05 undercloud sudo[75336]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:06 undercloud sudo[75426]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nxlllqiciaaviujdcdtnkjqcyejcaakv ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748206.0167263-75363-125575295086992/AnsiballZ_setup.py Dec 3 07:50:06 undercloud sudo[75426]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:08 undercloud sudo[75426]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:09 undercloud sudo[75700]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nalqoqaxrporjncjmlfjqmzgztthlbqf ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748208.9579754-75683-279089244024118/AnsiballZ_command.py Dec 3 07:50:09 undercloud sudo[75700]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:09 undercloud sudo[75700]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:10 undercloud sudo[75729]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-exxwgnctxvgafcgtqwyatftzgoejpaov ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748209.823867-75713-140478037411461/AnsiballZ_ipapermission.py Dec 3 07:50:10 undercloud sudo[75729]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:11 undercloud sudo[75729]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:11 undercloud sudo[75750]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-aznxbuydhckomuwdcfntspgxaenfyfgn ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748211.2661655-75713-117286923017126/AnsiballZ_ipapermission.py Dec 3 07:50:11 undercloud sudo[75750]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:11 undercloud sshd[75753]: Invalid user solana from 45.148.10.240 port 42924 Dec 3 07:50:12 undercloud sshd[75753]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:50:12 undercloud sshd[75753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:50:12 undercloud sudo[75750]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:12 undercloud sudo[75797]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-odhppueirbtdhacjeglsrcbeefmucihh ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748212.6864758-75713-253701186956262/AnsiballZ_ipapermission.py Dec 3 07:50:12 undercloud sudo[75797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:14 undercloud sshd[75753]: Failed password for invalid user solana from 45.148.10.240 port 42924 ssh2 Dec 3 07:50:14 undercloud sudo[75797]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:14 undercloud sudo[75821]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bijzaiclzulpazjgisqemlovsntpoldo ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748214.2786953-75713-106732211147968/AnsiballZ_ipapermission.py Dec 3 07:50:14 undercloud sudo[75821]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:14 undercloud sshd[75753]: Connection closed by invalid user solana 45.148.10.240 port 42924 [preauth] Dec 3 07:50:15 undercloud sudo[75821]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:15 undercloud sudo[75842]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jkhwsaiseiawivzszwtqdcufrcfqhctx ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748215.619706-75830-221496785905105/AnsiballZ_ipaprivilege.py Dec 3 07:50:15 undercloud sudo[75842]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:16 undercloud sudo[75842]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:17 undercloud sudo[75864]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uyevnhzydffwvofaoerlwlqxhykvioxs ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748217.088904-75852-210070416080416/AnsiballZ_ipaprivilege.py Dec 3 07:50:17 undercloud sudo[75864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:18 undercloud sudo[75864]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:18 undercloud sudo[75889]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-baoaykzcexgexzbjcczunyatghkkirqy ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748218.4260416-75852-164048808460832/AnsiballZ_ipaprivilege.py Dec 3 07:50:18 undercloud sudo[75889]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:19 undercloud sudo[75889]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:19 undercloud sudo[75956]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mnqagfxrptubhsthpejmnimbdfvfosgv ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748219.7946537-75852-64075877563099/AnsiballZ_ipaprivilege.py Dec 3 07:50:19 undercloud sudo[75956]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:21 undercloud sudo[75956]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:21 undercloud sudo[76035]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lybqpbultceofbbyftuiqvhghrphqegg ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748221.0674767-75852-104875053635402/AnsiballZ_ipaprivilege.py Dec 3 07:50:21 undercloud sudo[76035]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:22 undercloud sudo[76035]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:22 undercloud sudo[76066]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-eivmbcwizpwytrmgcduhtiocskqwviah ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748222.4068055-75852-10264057940010/AnsiballZ_ipaprivilege.py Dec 3 07:50:22 undercloud sudo[76066]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:23 undercloud sudo[76066]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:24 undercloud sudo[76107]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mhmwxulzjbrvlirlhyhidceorkcfvlxe ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748223.9540815-75852-195853891793572/AnsiballZ_ipaprivilege.py Dec 3 07:50:24 undercloud sudo[76107]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:25 undercloud sudo[76107]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:25 undercloud sudo[76131]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-clsifigirdatpibefjpuzwbckbmuntck ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748225.5286717-75852-257313014763465/AnsiballZ_ipaprivilege.py Dec 3 07:50:25 undercloud sudo[76131]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:26 undercloud sudo[76131]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:26 undercloud sudo[76151]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-oduneuhqtavqxhwipafthkaxkcvagofs ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748226.7924519-75852-15731067526451/AnsiballZ_ipaprivilege.py Dec 3 07:50:26 undercloud sudo[76151]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:27 undercloud sudo[76151]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:27 undercloud sudo[76171]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qydnmnqkuzdxcbiazzkgzxaokhblzoml ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748227.841678-75852-8648434384399/AnsiballZ_ipaprivilege.py Dec 3 07:50:27 undercloud sudo[76171]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:29 undercloud sudo[76171]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:29 undercloud sudo[76193]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pfflymsztaaaxldighyswgmlgyqlrebq ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748229.1495614-75852-29656510413881/AnsiballZ_ipaprivilege.py Dec 3 07:50:29 undercloud sudo[76193]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:30 undercloud sudo[76193]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:30 undercloud sudo[76217]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mbthubroezwgokofafmpugwvfsdvqhbn ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748230.7744622-75852-128855454347842/AnsiballZ_ipaprivilege.py Dec 3 07:50:30 undercloud sudo[76217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:32 undercloud sudo[76217]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:32 undercloud sudo[76277]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ltmjplmzgcmefclqcurgkfetthcwwmzx ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748232.564266-75852-273079312525917/AnsiballZ_ipaprivilege.py Dec 3 07:50:32 undercloud sudo[76277]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:33 undercloud sudo[76277]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:33 undercloud sudo[76297]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mtazferockfjnozzgqxowcagjjenvqfr ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748233.5619154-75852-48777633942857/AnsiballZ_ipaprivilege.py Dec 3 07:50:33 undercloud sudo[76297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:34 undercloud sudo[76297]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:34 undercloud sudo[76317]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xucuannezelquzafgcktgmhvbjnuwgvg ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748234.5803313-75852-147246802362536/AnsiballZ_ipaprivilege.py Dec 3 07:50:34 undercloud sudo[76317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:36 undercloud sudo[76317]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:36 undercloud sudo[76560]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rzsuvbtbyfvrscgqeaqrwlvsgmkbnuva ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748236.189218-75852-76205206758108/AnsiballZ_ipaprivilege.py Dec 3 07:50:36 undercloud sudo[76560]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:37 undercloud sudo[76560]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:37 undercloud sudo[76580]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-arqeqelnynzlyvihtwytibznfocgwjmk ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748237.4627168-75852-152979816720107/AnsiballZ_ipaprivilege.py Dec 3 07:50:37 undercloud sudo[76580]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:38 undercloud sudo[76580]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:38 undercloud sudo[76666]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ydannvfgdspztgiffubcbwpkxvralnfg ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748238.7198822-75852-141888921061145/AnsiballZ_ipaprivilege.py Dec 3 07:50:38 undercloud sudo[76666]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:39 undercloud sudo[76666]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:40 undercloud sudo[76697]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-elrqgrwewcqtdjifybjedvfnylqdbrfz ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748239.9928598-75852-85344083887149/AnsiballZ_ipaprivilege.py Dec 3 07:50:40 undercloud sudo[76697]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:41 undercloud sudo[76697]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:41 undercloud sudo[76717]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tuqnailyrnlqdldcqzvkxefmdlbbhfav ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748241.5757759-75852-263627471639659/AnsiballZ_ipaprivilege.py Dec 3 07:50:41 undercloud sudo[76717]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:42 undercloud sudo[76717]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:42 undercloud sudo[76764]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cntgbnhvoewmnbqzhkyhqpyfkrarjzwd ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748242.8434854-75852-137563981207740/AnsiballZ_ipaprivilege.py Dec 3 07:50:42 undercloud sudo[76764]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:44 undercloud sudo[76764]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:44 undercloud sshd[76773]: error: kex_exchange_identification: client sent invalid protocol identifier "GET / HTTP/1.1" Dec 3 07:50:44 undercloud sshd[76773]: banner exchange: Connection from 184.105.139.68 port 22316: invalid format Dec 3 07:50:44 undercloud sudo[76786]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-htgjatpltegbbltxbmlcgqbyojzkacgd ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748244.4330823-76774-277168323655955/AnsiballZ_iparole.py Dec 3 07:50:44 undercloud sudo[76786]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:46 undercloud sudo[76786]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:46 undercloud sudo[76814]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-haaeapissubkbhirbljcjunqmnkjnfxk ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748246.260082-76802-200700848939723/AnsiballZ_ipaservice.py Dec 3 07:50:46 undercloud sudo[76814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:47 undercloud sudo[76814]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:48 undercloud sudo[76840]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-duodwtulvjqtegpbbwvrhtznxqfirwxy ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748247.9891584-76828-57596621427760/AnsiballZ_iparole.py Dec 3 07:50:48 undercloud sudo[76840]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:48 undercloud sudo[76840]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:49 undercloud sudo[76864]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ffkfwugjlhnyxvyceuodzgwojcyctyxh ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748249.010596-76850-204137512118964/AnsiballZ_iparole.py Dec 3 07:50:49 undercloud sudo[76864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:50 undercloud sudo[76864]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:50 undercloud sudo[76937]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qadehsxdhneseraighcamipcupvxrwuq ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748250.671235-76903-151710002812944/AnsiballZ_file.py Dec 3 07:50:50 undercloud sudo[76937]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:50 undercloud sudo[76937]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:51 undercloud sudo[76959]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bjxsbyyfkyvophlwkdvpflssokqrmffa ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748251.0309012-76947-171567280928697/AnsiballZ_command.py Dec 3 07:50:51 undercloud sudo[76959]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:51 undercloud sudo[76959]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:51 undercloud sudo[77004]: zuul : PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-acjrepzwwpeqfvbxmxtckzehxzdrnyuf ; IPA_USER=admin IPA_HOST=ipa.ooo.test IPA_PASS=fce95318204114530f31f885c9df588f /usr/bin/python3 /home/zuul/.ansible/tmp/ansible-tmp-1764748251.637354-76977-217321211982951/AnsiballZ_file.py Dec 3 07:50:51 undercloud sudo[77004]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:50:51 undercloud sudo[77004]: pam_unix(sudo:session): session closed for user root Dec 3 07:50:59 undercloud sshd[71013]: Received disconnect from 192.168.122.100 port 56286:11: disconnected by user Dec 3 07:50:59 undercloud sshd[71013]: Disconnected from user zuul 192.168.122.100 port 56286 Dec 3 07:50:59 undercloud sshd[71003]: pam_unix(sshd:session): session closed for user zuul Dec 3 07:51:00 undercloud sudo[77115]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera rabbitmq::default_user Dec 3 07:51:00 undercloud sudo[77115]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:00 undercloud sudo[77115]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:00 undercloud sudo[77122]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera rabbitmq::default_pass Dec 3 07:51:00 undercloud sudo[77122]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:00 undercloud sudo[77122]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:00 undercloud sudo[77125]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera fqdn_ctlplane Dec 3 07:51:00 undercloud sudo[77125]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:00 undercloud sudo[77125]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:00 undercloud sudo[77128]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera rabbitmq::port Dec 3 07:51:00 undercloud sudo[77128]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:00 undercloud sudo[77128]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:00 undercloud sudo[77131]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera controller_virtual_ip Dec 3 07:51:00 undercloud sudo[77131]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:01 undercloud sudo[77131]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:01 undercloud sudo[77135]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera ctlplane Dec 3 07:51:01 undercloud sudo[77135]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:01 undercloud sudo[77135]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:01 undercloud sudo[77138]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -h 192.168.122.100 -e show databases; Dec 3 07:51:01 undercloud sudo[77138]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:01 undercloud sudo[77138]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:01 undercloud sudo[77169]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root rabbitmq rabbitmqctl list_queues Dec 3 07:51:01 undercloud sudo[77169]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:01 undercloud runuser[77195]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Dec 3 07:51:02 undercloud runuser[77195]: pam_unix(runuser:session): session closed for user rabbitmq Dec 3 07:51:02 undercloud sudo[77169]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:02 undercloud sudo[77253]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e show databases like "heat" Dec 3 07:51:02 undercloud sudo[77253]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:02 undercloud sudo[77253]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:02 undercloud sudo[77296]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e create database heat Dec 3 07:51:02 undercloud sudo[77296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:02 undercloud sudo[77296]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:02 undercloud sudo[77323]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e create user if not exists 'heat'@'%' identified by 'heat' Dec 3 07:51:02 undercloud sudo[77323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:02 undercloud sudo[77323]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:02 undercloud sudo[77352]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql heat -e grant all privileges on heat.* to 'heat'@'%' Dec 3 07:51:02 undercloud sudo[77352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:03 undercloud sudo[77352]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:03 undercloud sudo[77389]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e flush privileges; Dec 3 07:51:03 undercloud sudo[77389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:03 undercloud sudo[77389]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:03 undercloud sudo[77423]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman run --rm --user heat --net host --volume /home/zuul/overcloud-deploy/overcloud/heat-launcher/heat.conf:/etc/heat/heat.conf:z --volume /home/zuul/overcloud-deploy/overcloud/heat-launcher:/home/zuul/overcloud-deploy/overcloud/heat-launcher:z localhost/tripleo/openstack-heat-api:ephemeral heat-manage db_sync Dec 3 07:51:03 undercloud sudo[77423]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:05 undercloud sudo[77423]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:05 undercloud sudo[77469]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod inspect --format "{{.State}}" ephemeral-heat Dec 3 07:51:05 undercloud sudo[77469]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:05 undercloud sudo[77469]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:05 undercloud sudo[77488]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman play kube /home/zuul/overcloud-deploy/overcloud/heat-launcher/heat-pod.yaml Dec 3 07:51:05 undercloud sudo[77488]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:07 undercloud sudo[77488]: pam_unix(sudo:session): session closed for user root Dec 3 07:51:08 undercloud sudo[77812]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec rabbitmq rabbitmqctl list_queues Dec 3 07:51:09 undercloud sudo[77812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:51:10 undercloud sudo[77812]: pam_unix(sudo:session): session closed for user root Dec 3 07:52:06 undercloud sshd[78875]: error: kex_exchange_identification: banner line contains invalid characters Dec 3 07:52:06 undercloud sshd[78875]: banner exchange: Connection from 216.218.206.66 port 39656: invalid format Dec 3 07:52:22 undercloud sshd[79213]: Invalid user solana from 45.148.10.240 port 58242 Dec 3 07:52:22 undercloud sshd[79213]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:52:22 undercloud sshd[79213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:52:24 undercloud sshd[79213]: Failed password for invalid user solana from 45.148.10.240 port 58242 ssh2 Dec 3 07:52:25 undercloud sshd[79213]: Connection closed by invalid user solana 45.148.10.240 port 58242 [preauth] Dec 3 07:52:55 undercloud sudo[54804]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:21 undercloud sudo[81152]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod inspect ephemeral-heat Dec 3 07:54:21 undercloud sudo[81152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:21 undercloud sudo[81152]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:21 undercloud sudo[81167]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod kill ephemeral-heat Dec 3 07:54:21 undercloud sudo[81167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:21 undercloud sudo[81167]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:21 undercloud sudo[81218]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e show databases like "heat" Dec 3 07:54:21 undercloud sudo[81218]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:21 undercloud sudo[81218]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:21 undercloud sudo[81263]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysqldump heat Dec 3 07:54:21 undercloud sudo[81263]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:22 undercloud sudo[81263]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:29 undercloud sshd[81375]: Invalid user solana from 45.148.10.240 port 46932 Dec 3 07:54:29 undercloud sshd[81375]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:54:29 undercloud sshd[81375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:54:30 undercloud sshd[81375]: Failed password for invalid user solana from 45.148.10.240 port 46932 ssh2 Dec 3 07:54:31 undercloud sudo[81432]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql heat -e drop database heat Dec 3 07:54:31 undercloud sudo[81432]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:31 undercloud sudo[81432]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:31 undercloud sudo[81462]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e drop user 'heat'@'%' Dec 3 07:54:31 undercloud sudo[81462]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:32 undercloud sshd[81375]: Connection closed by invalid user solana 45.148.10.240 port 46932 [preauth] Dec 3 07:54:32 undercloud sudo[81462]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:32 undercloud sudo[81504]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod inspect ephemeral-heat Dec 3 07:54:32 undercloud sudo[81504]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:32 undercloud sudo[81504]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:32 undercloud sudo[81544]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod rm -f ephemeral-heat Dec 3 07:54:32 undercloud sudo[81544]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:32 undercloud sudo[81544]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:34 undercloud sudo[81573]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ktymegydpqboncagzfpufbiothrgeptm ; /usr/bin/python3 Dec 3 07:54:34 undercloud sudo[81573]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:34 undercloud sudo[81573]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:34 undercloud sudo[81579]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tcvnuoyszfckpahizwgmyytexsznxwcj ; /usr/bin/python3 Dec 3 07:54:34 undercloud sudo[81579]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:34 undercloud sudo[81579]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:35 undercloud sudo[81598]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pxrrfrxhrfbitylnpmhsftyijwdwnznt ; /usr/bin/python3 Dec 3 07:54:35 undercloud sudo[81598]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:35 undercloud sudo[81598]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:35 undercloud sudo[81604]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vprpsaqkoyeoxhwpaowsjuemcpukgdjm ; /usr/bin/python3 Dec 3 07:54:35 undercloud sudo[81604]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:35 undercloud sudo[81604]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:37 undercloud sudo[81648]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zhzcnxdpkrsqmibkbxwarwvsjkkcbosa ; /usr/bin/python3 Dec 3 07:54:37 undercloud sudo[81648]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:37 undercloud sudo[81648]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:38 undercloud sudo[81691]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qofxfontccglttmzybeoiloppsczevrp ; /usr/bin/python3 Dec 3 07:54:38 undercloud sudo[81691]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:38 undercloud sudo[81691]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:39 undercloud sudo[81788]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-votgzzgruxamzkliedsrempyutgxlaga ; /usr/bin/python3 Dec 3 07:54:39 undercloud sudo[81788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:39 undercloud sudo[81788]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:40 undercloud sudo[81859]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ghpqkaesxprxvjafyyhbnoahkdnbmbux ; /usr/bin/python3 Dec 3 07:54:40 undercloud sudo[81859]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:40 undercloud sudo[81859]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:40 undercloud sudo[81912]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zewpzycsmgbhgazhvgzarirtwoykttua ; /usr/bin/python3 Dec 3 07:54:40 undercloud sudo[81912]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:40 undercloud sudo[81912]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:40 undercloud sudo[81964]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hglqbqutlbcmvpdmgjvlskohvnlqirjc ; /usr/bin/python3 Dec 3 07:54:40 undercloud sudo[81964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:41 undercloud sudo[81964]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:41 undercloud sudo[82281]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jjrtmhazqopliycdsjgrsrawmeyvwnrv ; /usr/bin/python3 Dec 3 07:54:41 undercloud sudo[82281]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:41 undercloud sudo[82281]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:42 undercloud sudo[82317]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ebiaolidowoicomkyltpqeilqyvzqipy ; /usr/bin/python3 Dec 3 07:54:42 undercloud sudo[82317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:42 undercloud sudo[82317]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:42 undercloud sudo[82351]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fwudgnkifuhplkuxqxnzjvbxqntwmfpj ; /usr/bin/python3 Dec 3 07:54:42 undercloud sudo[82351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:42 undercloud sudo[82351]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:43 undercloud sudo[82425]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uxbixztwamiboffnmmhjagjrqjetcdmk ; /usr/bin/python3 Dec 3 07:54:43 undercloud sudo[82425]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:43 undercloud sudo[82425]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:45 undercloud sudo[82583]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vkxwmyxdkggnnnkamhjwdtwrqzpaebna ; /usr/bin/python3 Dec 3 07:54:45 undercloud sudo[82583]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:45 undercloud sudo[82583]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:46 undercloud sudo[82590]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rpucicifghgxloygyhlysawtwklobmfs ; /usr/bin/python3 Dec 3 07:54:46 undercloud sudo[82590]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:46 undercloud sudo[82590]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:46 undercloud sudo[82598]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-behzrtrpgxzjovbwsonvmzqvvjtjqxjz ; /usr/bin/python3 Dec 3 07:54:46 undercloud sudo[82598]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:46 undercloud sudo[82598]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:54 undercloud sudo[82665]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-eihxeqvzsczenrqoskaovajxkvwgitda ; /usr/bin/python3 Dec 3 07:54:54 undercloud sudo[82665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:54 undercloud sudo[82665]: pam_unix(sudo:session): session closed for user root Dec 3 07:54:55 undercloud sudo[82683]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-efflkklhuqdkulzdziiatidzjvjjlvdt ; /usr/bin/python3 Dec 3 07:54:55 undercloud sudo[82683]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:54:55 undercloud sudo[82683]: pam_unix(sudo:session): session closed for user root Dec 3 07:55:01 undercloud sudo[83301]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-sepiwpdxsvtudeytjgjqoxxweeeopvxf ; /usr/bin/python3 Dec 3 07:55:01 undercloud sudo[83301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:55:01 undercloud sudo[83301]: pam_unix(sudo:session): session closed for user root Dec 3 07:55:01 undercloud sudo[83394]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-chthlkygoaszjurolciqlbnhwkdwdudr ; /usr/bin/python3 Dec 3 07:55:01 undercloud sudo[83394]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:55:02 undercloud sudo[83394]: pam_unix(sudo:session): session closed for user root Dec 3 07:55:02 undercloud sudo[83454]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jfzmpbmwkmjrpfvanmlbjnlaguxfatae ; /usr/bin/python3 Dec 3 07:55:02 undercloud sudo[83454]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:55:02 undercloud sudo[83454]: pam_unix(sudo:session): session closed for user root Dec 3 07:55:03 undercloud sudo[83483]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cgyfycvteytzhpjlafqctgnphjaiygrh ; /usr/bin/python3 Dec 3 07:55:03 undercloud sudo[83483]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:55:03 undercloud sudo[83483]: pam_unix(sudo:session): session closed for user root Dec 3 07:55:03 undercloud sudo[83529]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-psoqkigkkjckvqlkunobfuxzrhsqxrrc ; /usr/bin/python3 Dec 3 07:55:03 undercloud sudo[83529]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:55:04 undercloud sudo[83529]: pam_unix(sudo:session): session closed for user root Dec 3 07:55:04 undercloud sudo[83566]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nfvxeobszojbguiqsahnozjoveoclnbl ; /usr/bin/python3 Dec 3 07:55:04 undercloud sudo[83566]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:55:04 undercloud sudo[83566]: pam_unix(sudo:session): session closed for user root Dec 3 07:56:42 undercloud sshd[86145]: Invalid user sol from 45.148.10.240 port 39922 Dec 3 07:56:42 undercloud sshd[86145]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:56:42 undercloud sshd[86145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:56:45 undercloud sshd[86145]: Failed password for invalid user sol from 45.148.10.240 port 39922 ssh2 Dec 3 07:56:46 undercloud sshd[86145]: Connection closed by invalid user sol 45.148.10.240 port 39922 [preauth] Dec 3 07:57:17 undercloud sudo[89580]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jlavmuxzffxwhoexxgvqkhovfpdkxlpn ; /usr/bin/python3 Dec 3 07:57:17 undercloud sudo[89584]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-utikhsxcszohcqyxciioojpuilensxmv ; /usr/bin/python3 Dec 3 07:57:17 undercloud sudo[89584]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:57:17 undercloud sudo[89580]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:57:17 undercloud sudo[89587]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vghqkjmxwoytrnwsgrxqwmhadzvlxwzw ; /usr/bin/python3 Dec 3 07:57:17 undercloud sudo[89587]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:57:17 undercloud sudo[89593]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-yivlnfdakxqthttsmpqmckikjaiqcfqe ; /usr/bin/python3 Dec 3 07:57:17 undercloud sudo[89593]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:57:17 undercloud sudo[89598]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lkewicriepybybekavdidphxzgoaursu ; /usr/bin/python3 Dec 3 07:57:17 undercloud sudo[89598]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:57:17 undercloud sudo[89602]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wzpgpuyzimsplctidjjvxatsqsppnyyg ; /usr/bin/python3 Dec 3 07:57:17 undercloud sudo[89602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 07:57:17 undercloud sudo[89580]: pam_unix(sudo:session): session closed for user root Dec 3 07:57:17 undercloud sudo[89584]: pam_unix(sudo:session): session closed for user root Dec 3 07:57:17 undercloud sudo[89587]: pam_unix(sudo:session): session closed for user root Dec 3 07:57:17 undercloud sudo[89602]: pam_unix(sudo:session): session closed for user root Dec 3 07:57:17 undercloud sudo[89598]: pam_unix(sudo:session): session closed for user root Dec 3 07:57:17 undercloud sudo[89593]: pam_unix(sudo:session): session closed for user root Dec 3 07:58:41 undercloud sshd[93113]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.135.232.92 user=admin Dec 3 07:58:41 undercloud sshd[93113]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 07:58:43 undercloud sshd[93113]: Failed password for admin from 45.135.232.92 port 65064 ssh2 Dec 3 07:58:46 undercloud sshd[93401]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.135.232.92 user=admin Dec 3 07:58:46 undercloud sshd[93401]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 07:58:48 undercloud sshd[93113]: error: PAM: Authentication failure for admin from 45.135.232.92 Dec 3 07:58:48 undercloud sshd[93113]: fatal: userauth_finish: send failure packet: Connection reset by peer [preauth] Dec 3 07:58:58 undercloud sshd[94841]: Invalid user sol from 45.148.10.240 port 50336 Dec 3 07:58:58 undercloud sshd[94841]: pam_unix(sshd:auth): check pass; user unknown Dec 3 07:58:58 undercloud sshd[94841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 07:58:59 undercloud sshd[94841]: Failed password for invalid user sol from 45.148.10.240 port 50336 ssh2 Dec 3 07:59:00 undercloud sshd[94841]: Connection closed by invalid user sol 45.148.10.240 port 50336 [preauth] Dec 3 08:01:00 undercloud sudo[102918]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-harwufmlbyhwgqitxvhvuewsnpounxjx ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543228.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:00 undercloud sudo[102919]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ceatpamqvuelnfsbjnzgxfenhvwkklju ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543230.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:00 undercloud sudo[102918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:00 undercloud sudo[102919]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:00 undercloud sudo[102934]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-waibjinlmsfdevmoncbyzpvwznxksgrd ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543231.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:00 undercloud sudo[102934]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:00 undercloud sudo[102918]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:00 undercloud sudo[102919]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:00 undercloud sudo[102964]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tflmuuobfaayqdoflnvmuspuijjulrto ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543225.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:00 undercloud sudo[102964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:00 undercloud sudo[102934]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:00 undercloud sudo[102973]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jwiapuixzozlglakkyvmnbuiqzvjlkao ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543226.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:00 undercloud sudo[102973]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:00 undercloud sudo[102964]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:00 undercloud sudo[102984]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zyudegjpzprmsjktuvgtomfwwocuaqfp ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543227.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:00 undercloud sudo[102984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:00 undercloud sudo[102973]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:00 undercloud sudo[102984]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:01 undercloud sudo[103001]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-yohezefkojeepaorilvevovlebokfxqz ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543225.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:01 undercloud sudo[103001]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:01 undercloud sudo[103000]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kznsgrqokwlnlpkfgcoiztmlglekvzvs ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543231.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:01 undercloud sudo[103000]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:01 undercloud sudo[103003]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qnddcjwepxibualdmzuzuyyubkdihlqa ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543228.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:01 undercloud sudo[103003]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:01 undercloud sudo[103002]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-buxlpcqwubunevqctpshkzshvwuzwmks ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543230.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:01 undercloud sudo[103002]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:01 undercloud sudo[103023]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-yuemjwvlqiupnlyyxqwcxrepmqsjyjzz ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543226.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:01 undercloud sudo[103023]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:01 undercloud sudo[103039]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rnnrstoorqckjlrlakxueerhrsrppolc ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543227.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:01 undercloud sudo[103039]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:01 undercloud sudo[103001]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:02 undercloud sudo[103000]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:02 undercloud sudo[103003]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:02 undercloud sudo[103002]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:02 undercloud sudo[103023]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:02 undercloud sudo[103090]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rikjyvtupuvczzupqixpykcepjiwlwrq ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543231.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:02 undercloud sudo[103091]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gaetlneqzdqqgleixhacauybjnyeumem ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543225.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:02 undercloud sudo[103090]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:02 undercloud sudo[103092]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jlitfhyrldynpyqxbxzxjgbbfwfnivad ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543228.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:02 undercloud sudo[103092]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:02 undercloud sudo[103091]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:02 undercloud sudo[103102]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xdpfqxoroqgopglxpdfnydvqcuapnukj ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543230.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:02 undercloud sudo[103102]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:02 undercloud sudo[103104]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vvtfszeypwxcdibusudowrmfjigxuaxb ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543226.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:02 undercloud sudo[103104]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:02 undercloud sudo[103039]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:02 undercloud sudo[103113]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-symkjdnfovpfohfhyhqbwvsvzuwprwtx ; IPA_HOST=ipa.ooo.test IPA_USER=nova/np0005543227.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:02 undercloud sudo[103113]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:04 undercloud sudo[103092]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:04 undercloud sudo[103090]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:04 undercloud sudo[103102]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:07 undercloud sudo[103104]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:07 undercloud sshd[103235]: Invalid user sol from 45.148.10.240 port 58552 Dec 3 08:01:07 undercloud sshd[103235]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:01:07 undercloud sshd[103235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:01:08 undercloud sudo[103091]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:08 undercloud sudo[103113]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:09 undercloud sshd[103235]: Failed password for invalid user sol from 45.148.10.240 port 58552 ssh2 Dec 3 08:01:11 undercloud sshd[103235]: Connection closed by invalid user sol 45.148.10.240 port 58552 [preauth] Dec 3 08:01:42 undercloud sudo[104775]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jnacjsfsqqzkidjjbebmukudscrbtggf ; /usr/bin/python3 Dec 3 08:01:42 undercloud sudo[104775]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:42 undercloud sudo[104775]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:43 undercloud sudo[104789]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ylxsoprbmpoqpxfjtezfdzwofaehsygi ; IPA_HOST=ipa.ooo.test IPA_USER=nova/undercloud.ooo.test KRB5CCNAME=/etc/novajoin/krb5.cache KRB5_CLIENT_KTNAME=FILE:/etc/novajoin/krb5.keytab /usr/bin/python3 Dec 3 08:01:43 undercloud sudo[104789]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:47 undercloud sudo[104789]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:47 undercloud sudo[104862]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-iybghiptslynkeybbeybbpffooomyjbq ; /usr/bin/python3 Dec 3 08:01:47 undercloud sudo[104862]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:47 undercloud sudo[104862]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:48 undercloud sudo[104870]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cmuzntxnpmitpffrdiioiknafsjawjqu ; /usr/bin/python3 Dec 3 08:01:48 undercloud sudo[104870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:48 undercloud sudo[104870]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:48 undercloud sudo[104891]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-odttycnpflxxqknqwyogppoyubwahqap ; /usr/bin/python3 Dec 3 08:01:48 undercloud sudo[104891]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:48 undercloud sudo[104891]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:48 undercloud sudo[104895]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nicunhidvudvsaspgasimfbolynrxbel ; /usr/bin/python3 Dec 3 08:01:48 undercloud sudo[104895]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:49 undercloud sudo[104895]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:49 undercloud sudo[104899]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hxwgozpqzongaumgcjgbgwpqezspcalg ; /usr/bin/python3 Dec 3 08:01:49 undercloud sudo[104899]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 08:01:49 undercloud sudo[104899]: pam_unix(sudo:session): session closed for user root Dec 3 08:01:56 undercloud sshd[105788]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.202.233.33 user=admin Dec 3 08:01:56 undercloud sshd[105788]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:01:57 undercloud sshd[105788]: Failed password for admin from 91.202.233.33 port 36848 ssh2 Dec 3 08:01:59 undercloud sshd[106042]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.202.233.33 user=admin Dec 3 08:01:59 undercloud sshd[106042]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:02:01 undercloud sshd[105788]: error: PAM: Authentication failure for admin from 91.202.233.33 Dec 3 08:02:01 undercloud sshd[105788]: Connection reset by authenticating user admin 91.202.233.33 port 36848 [preauth] Dec 3 08:02:03 undercloud sshd[106168]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.202.233.33 user=admin Dec 3 08:02:03 undercloud sshd[106168]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:02:05 undercloud sshd[106168]: Failed password for admin from 91.202.233.33 port 37824 ssh2 Dec 3 08:02:06 undercloud sshd[106252]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.202.233.33 user=admin Dec 3 08:02:06 undercloud sshd[106252]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:02:08 undercloud sshd[106168]: error: PAM: Authentication failure for admin from 91.202.233.33 Dec 3 08:02:08 undercloud sshd[106168]: Connection reset by authenticating user admin 91.202.233.33 port 37824 [preauth] Dec 3 08:02:10 undercloud unix_chkpwd[106400]: password check failed for user (root) Dec 3 08:02:10 undercloud sshd[106338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.202.233.33 user=root Dec 3 08:02:12 undercloud sshd[106338]: Failed password for root from 91.202.233.33 port 62896 ssh2 Dec 3 08:02:13 undercloud unix_chkpwd[106445]: password check failed for user (root) Dec 3 08:02:16 undercloud sshd[106338]: error: PAM: Authentication failure for root from 91.202.233.33 Dec 3 08:02:16 undercloud sshd[106338]: fatal: userauth_finish: send failure packet: Connection reset by peer [preauth] Dec 3 08:03:24 undercloud sshd[108200]: Invalid user sol from 45.148.10.240 port 54826 Dec 3 08:03:24 undercloud sshd[108200]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:03:24 undercloud sshd[108200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:03:26 undercloud sshd[108200]: Failed password for invalid user sol from 45.148.10.240 port 54826 ssh2 Dec 3 08:03:28 undercloud sshd[108200]: Connection closed by invalid user sol 45.148.10.240 port 54826 [preauth] Dec 3 08:05:37 undercloud sshd[113092]: Invalid user sol from 45.148.10.240 port 54990 Dec 3 08:05:37 undercloud sshd[113092]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:05:37 undercloud sshd[113092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:05:39 undercloud sshd[113092]: Failed password for invalid user sol from 45.148.10.240 port 54990 ssh2 Dec 3 08:05:39 undercloud sshd[113092]: Connection closed by invalid user sol 45.148.10.240 port 54990 [preauth] Dec 3 08:05:45 undercloud sshd[113128]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=admin Dec 3 08:05:45 undercloud sshd[113128]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:05:47 undercloud sshd[113128]: Failed password for admin from 45.140.17.124 port 56160 ssh2 Dec 3 08:05:48 undercloud sshd[113192]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=admin Dec 3 08:05:48 undercloud sshd[113192]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:05:49 undercloud sshd[113128]: error: PAM: Authentication failure for admin from 45.140.17.124 Dec 3 08:05:49 undercloud sshd[113128]: Connection reset by authenticating user admin 45.140.17.124 port 56160 [preauth] Dec 3 08:05:51 undercloud sshd[113219]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=admin Dec 3 08:05:51 undercloud sshd[113219]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:05:54 undercloud sshd[113219]: Failed password for admin from 45.140.17.124 port 63180 ssh2 Dec 3 08:05:56 undercloud sshd[113303]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=admin Dec 3 08:05:56 undercloud sshd[113303]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:05:57 undercloud sshd[113219]: error: PAM: Authentication failure for admin from 45.140.17.124 Dec 3 08:05:57 undercloud sshd[113219]: fatal: userauth_finish: send failure packet: Connection reset by peer [preauth] Dec 3 08:07:11 undercloud unix_chkpwd[114617]: password check failed for user (root) Dec 3 08:07:11 undercloud sshd[114611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.190.3.100 user=root Dec 3 08:07:14 undercloud sshd[114611]: Failed password for root from 220.190.3.100 port 29608 ssh2 Dec 3 08:07:45 undercloud sshd[115197]: Invalid user sol from 45.148.10.240 port 44910 Dec 3 08:07:45 undercloud sshd[115197]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:07:45 undercloud sshd[115197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:07:47 undercloud sshd[115197]: Failed password for invalid user sol from 45.148.10.240 port 44910 ssh2 Dec 3 08:07:49 undercloud sshd[115197]: Connection closed by invalid user sol 45.148.10.240 port 44910 [preauth] Dec 3 08:09:08 undercloud sshd[114611]: fatal: Timeout before authentication for 220.190.3.100 port 29608 Dec 3 08:10:01 undercloud sshd[117608]: Invalid user sol from 45.148.10.240 port 38272 Dec 3 08:10:01 undercloud sshd[117608]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:10:01 undercloud sshd[117608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:10:04 undercloud sshd[117608]: Failed password for invalid user sol from 45.148.10.240 port 38272 ssh2 Dec 3 08:10:05 undercloud sshd[117608]: Connection closed by invalid user sol 45.148.10.240 port 38272 [preauth] Dec 3 08:12:14 undercloud sshd[119809]: Invalid user sol from 45.148.10.240 port 41040 Dec 3 08:12:14 undercloud sshd[119809]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:12:14 undercloud sshd[119809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:12:16 undercloud sshd[119809]: Failed password for invalid user sol from 45.148.10.240 port 41040 ssh2 Dec 3 08:12:16 undercloud sshd[119809]: Connection closed by invalid user sol 45.148.10.240 port 41040 [preauth] Dec 3 08:14:26 undercloud sshd[121843]: Invalid user funded from 45.148.10.240 port 40786 Dec 3 08:14:26 undercloud sshd[121843]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:14:26 undercloud sshd[121843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:14:28 undercloud sshd[121843]: Failed password for invalid user funded from 45.148.10.240 port 40786 ssh2 Dec 3 08:14:28 undercloud sshd[121843]: Connection closed by invalid user funded 45.148.10.240 port 40786 [preauth] Dec 3 08:16:45 undercloud sshd[123976]: Invalid user sol from 45.148.10.240 port 53958 Dec 3 08:16:46 undercloud sshd[123976]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:16:46 undercloud sshd[123976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:16:48 undercloud sshd[123976]: Failed password for invalid user sol from 45.148.10.240 port 53958 ssh2 Dec 3 08:16:50 undercloud sshd[123976]: Connection closed by invalid user sol 45.148.10.240 port 53958 [preauth] Dec 3 08:18:59 undercloud sshd[126229]: Invalid user sol from 45.148.10.240 port 39818 Dec 3 08:18:59 undercloud sshd[126229]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:18:59 undercloud sshd[126229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:19:01 undercloud sshd[126229]: Failed password for invalid user sol from 45.148.10.240 port 39818 ssh2 Dec 3 08:19:02 undercloud sshd[126229]: Connection closed by invalid user sol 45.148.10.240 port 39818 [preauth] Dec 3 08:21:13 undercloud sshd[128268]: Invalid user sol from 45.148.10.240 port 55796 Dec 3 08:21:13 undercloud sshd[128268]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:21:13 undercloud sshd[128268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:21:14 undercloud sshd[128268]: Failed password for invalid user sol from 45.148.10.240 port 55796 ssh2 Dec 3 08:21:15 undercloud sshd[128268]: Connection closed by invalid user sol 45.148.10.240 port 55796 [preauth] Dec 3 08:23:31 undercloud sshd[130314]: Invalid user sol from 45.148.10.240 port 38530 Dec 3 08:23:32 undercloud sshd[130314]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:23:32 undercloud sshd[130314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:23:33 undercloud sshd[130314]: Failed password for invalid user sol from 45.148.10.240 port 38530 ssh2 Dec 3 08:23:34 undercloud sshd[130314]: Connection closed by invalid user sol 45.148.10.240 port 38530 [preauth] Dec 3 08:25:44 undercloud sshd[132608]: Invalid user sol from 45.148.10.240 port 41098 Dec 3 08:25:44 undercloud sshd[132608]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:25:44 undercloud sshd[132608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:25:46 undercloud sshd[132608]: Failed password for invalid user sol from 45.148.10.240 port 41098 ssh2 Dec 3 08:25:48 undercloud sshd[132608]: Connection closed by invalid user sol 45.148.10.240 port 41098 [preauth] Dec 3 08:27:57 undercloud sshd[134614]: Invalid user sol from 45.148.10.240 port 50016 Dec 3 08:27:57 undercloud sshd[134614]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:27:57 undercloud sshd[134614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:28:00 undercloud sshd[134614]: Failed password for invalid user sol from 45.148.10.240 port 50016 ssh2 Dec 3 08:28:01 undercloud sshd[134614]: Connection closed by invalid user sol 45.148.10.240 port 50016 [preauth] Dec 3 08:30:17 undercloud sshd[136901]: Invalid user sol from 45.148.10.240 port 45266 Dec 3 08:30:17 undercloud sshd[136901]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:30:17 undercloud sshd[136901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:30:19 undercloud sshd[136901]: Failed password for invalid user sol from 45.148.10.240 port 45266 ssh2 Dec 3 08:30:21 undercloud sshd[136901]: Connection closed by invalid user sol 45.148.10.240 port 45266 [preauth] Dec 3 08:30:36 undercloud sshd[137071]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.135.232.92 user=admin Dec 3 08:30:36 undercloud sshd[137071]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:30:39 undercloud sshd[137071]: Failed password for admin from 45.135.232.92 port 42712 ssh2 Dec 3 08:30:41 undercloud sshd[137183]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.135.232.92 user=admin Dec 3 08:30:41 undercloud sshd[137183]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:30:43 undercloud sshd[137071]: error: PAM: Authentication failure for admin from 45.135.232.92 Dec 3 08:30:43 undercloud sshd[137071]: fatal: userauth_finish: send failure packet: Connection reset by peer [preauth] Dec 3 08:32:34 undercloud sshd[139021]: Invalid user sol from 45.148.10.240 port 50958 Dec 3 08:32:34 undercloud sshd[139021]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:32:34 undercloud sshd[139021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:32:36 undercloud sshd[139021]: Failed password for invalid user sol from 45.148.10.240 port 50958 ssh2 Dec 3 08:32:36 undercloud sshd[139021]: Connection closed by invalid user sol 45.148.10.240 port 50958 [preauth] Dec 3 08:33:26 undercloud unix_chkpwd[139887]: password check failed for user (root) Dec 3 08:33:26 undercloud sshd[139885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.202.233.33 user=root Dec 3 08:33:27 undercloud sshd[139885]: Failed password for root from 91.202.233.33 port 50618 ssh2 Dec 3 08:33:29 undercloud unix_chkpwd[139961]: password check failed for user (root) Dec 3 08:33:32 undercloud sshd[139885]: error: PAM: Authentication failure for root from 91.202.233.33 Dec 3 08:33:32 undercloud sshd[139885]: fatal: userauth_finish: send failure packet: Connection reset by peer [preauth] Dec 3 08:34:55 undercloud sshd[141366]: Invalid user sol from 45.148.10.240 port 39714 Dec 3 08:34:55 undercloud sshd[141366]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:34:55 undercloud sshd[141366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:34:58 undercloud sshd[141366]: Failed password for invalid user sol from 45.148.10.240 port 39714 ssh2 Dec 3 08:34:59 undercloud sshd[141366]: Connection closed by invalid user sol 45.148.10.240 port 39714 [preauth] Dec 3 08:37:16 undercloud sshd[143488]: Invalid user sol from 45.148.10.240 port 54262 Dec 3 08:37:16 undercloud sshd[143488]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:37:16 undercloud sshd[143488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:37:19 undercloud sshd[143488]: Failed password for invalid user sol from 45.148.10.240 port 54262 ssh2 Dec 3 08:37:20 undercloud sshd[143488]: Connection closed by invalid user sol 45.148.10.240 port 54262 [preauth] Dec 3 08:37:58 undercloud sshd[144069]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=admin Dec 3 08:37:58 undercloud sshd[144069]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:37:59 undercloud sshd[144069]: Failed password for admin from 45.140.17.124 port 31048 ssh2 Dec 3 08:38:01 undercloud sshd[144079]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=admin Dec 3 08:38:01 undercloud sshd[144079]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 08:38:02 undercloud sshd[144069]: error: PAM: Authentication failure for admin from 45.140.17.124 Dec 3 08:38:03 undercloud sshd[144069]: Connection reset by authenticating user admin 45.140.17.124 port 31048 [preauth] Dec 3 08:38:04 undercloud unix_chkpwd[144333]: password check failed for user (root) Dec 3 08:38:04 undercloud sshd[144331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=root Dec 3 08:38:06 undercloud sshd[144331]: Failed password for root from 45.140.17.124 port 51068 ssh2 Dec 3 08:38:07 undercloud unix_chkpwd[144410]: password check failed for user (root) Dec 3 08:38:10 undercloud sshd[144331]: error: PAM: Authentication failure for root from 45.140.17.124 Dec 3 08:38:10 undercloud sshd[144331]: Connection reset by authenticating user root 45.140.17.124 port 51068 [preauth] Dec 3 08:38:11 undercloud sshd[144417]: Invalid user test from 45.140.17.124 port 50238 Dec 3 08:38:11 undercloud sshd[144417]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:38:11 undercloud sshd[144417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 Dec 3 08:38:13 undercloud sshd[144417]: Failed password for invalid user test from 45.140.17.124 port 50238 ssh2 Dec 3 08:38:15 undercloud sshd[144417]: Postponed keyboard-interactive for invalid user test from 45.140.17.124 port 50238 ssh2 [preauth] Dec 3 08:38:15 undercloud sshd[144466]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:38:17 undercloud sshd[144417]: error: PAM: Authentication failure for illegal user test from 45.140.17.124 Dec 3 08:38:17 undercloud sshd[144417]: Failed keyboard-interactive/pam for invalid user test from 45.140.17.124 port 50238 ssh2 Dec 3 08:38:17 undercloud sshd[144417]: Connection reset by invalid user test 45.140.17.124 port 50238 [preauth] Dec 3 08:38:18 undercloud unix_chkpwd[144488]: password check failed for user (root) Dec 3 08:38:18 undercloud sshd[144483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=root Dec 3 08:38:20 undercloud sshd[144483]: Failed password for root from 45.140.17.124 port 50270 ssh2 Dec 3 08:38:21 undercloud unix_chkpwd[144496]: password check failed for user (root) Dec 3 08:38:23 undercloud sshd[144483]: error: PAM: Authentication failure for root from 45.140.17.124 Dec 3 08:38:24 undercloud sshd[144483]: Connection reset by authenticating user root 45.140.17.124 port 50270 [preauth] Dec 3 08:38:25 undercloud unix_chkpwd[144567]: password check failed for user (root) Dec 3 08:38:25 undercloud sshd[144499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=root Dec 3 08:38:27 undercloud sshd[144499]: Failed password for root from 45.140.17.124 port 30510 ssh2 Dec 3 08:38:28 undercloud unix_chkpwd[144569]: password check failed for user (root) Dec 3 08:38:30 undercloud sshd[144499]: error: PAM: Authentication failure for root from 45.140.17.124 Dec 3 08:38:31 undercloud sshd[144499]: Connection reset by authenticating user root 45.140.17.124 port 30510 [preauth] Dec 3 08:39:30 undercloud sshd[145538]: Invalid user sol from 45.148.10.240 port 51118 Dec 3 08:39:30 undercloud sshd[145538]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:39:30 undercloud sshd[145538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:39:32 undercloud sshd[145538]: Failed password for invalid user sol from 45.148.10.240 port 51118 ssh2 Dec 3 08:39:34 undercloud sshd[145538]: Connection closed by invalid user sol 45.148.10.240 port 51118 [preauth] Dec 3 08:41:48 undercloud sshd[147862]: Invalid user sol from 45.148.10.240 port 34964 Dec 3 08:41:48 undercloud sshd[147862]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:41:48 undercloud sshd[147862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:41:51 undercloud sshd[147862]: Failed password for invalid user sol from 45.148.10.240 port 34964 ssh2 Dec 3 08:41:52 undercloud sshd[147862]: Connection closed by invalid user sol 45.148.10.240 port 34964 [preauth] Dec 3 08:42:04 undercloud sshd[148008]: Invalid user user from 78.128.112.74 port 45614 Dec 3 08:42:04 undercloud sshd[148008]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:42:04 undercloud sshd[148008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.112.74 Dec 3 08:42:06 undercloud sshd[148008]: Failed password for invalid user user from 78.128.112.74 port 45614 ssh2 Dec 3 08:42:08 undercloud sshd[148008]: Connection closed by invalid user user 78.128.112.74 port 45614 [preauth] Dec 3 08:44:04 undercloud sshd[149906]: Invalid user sol from 45.148.10.240 port 53676 Dec 3 08:44:04 undercloud sshd[149906]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:44:04 undercloud sshd[149906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:44:05 undercloud sshd[149906]: Failed password for invalid user sol from 45.148.10.240 port 53676 ssh2 Dec 3 08:44:06 undercloud sshd[149906]: Connection closed by invalid user sol 45.148.10.240 port 53676 [preauth] Dec 3 08:46:18 undercloud sshd[152167]: Invalid user sol from 45.148.10.240 port 42724 Dec 3 08:46:18 undercloud sshd[152167]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:46:18 undercloud sshd[152167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:46:20 undercloud sshd[152167]: Failed password for invalid user sol from 45.148.10.240 port 42724 ssh2 Dec 3 08:46:22 undercloud sshd[152167]: Connection closed by invalid user sol 45.148.10.240 port 42724 [preauth] Dec 3 08:48:42 undercloud sshd[154262]: Invalid user sol from 45.148.10.240 port 40572 Dec 3 08:48:42 undercloud sshd[154262]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:48:42 undercloud sshd[154262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:48:44 undercloud sshd[154262]: Failed password for invalid user sol from 45.148.10.240 port 40572 ssh2 Dec 3 08:48:44 undercloud sshd[154262]: Connection closed by invalid user sol 45.148.10.240 port 40572 [preauth] Dec 3 08:51:01 undercloud sshd[156663]: Invalid user user from 45.148.10.240 port 52530 Dec 3 08:51:02 undercloud sshd[156663]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:51:02 undercloud sshd[156663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:51:03 undercloud sshd[156663]: Failed password for invalid user user from 45.148.10.240 port 52530 ssh2 Dec 3 08:51:05 undercloud sshd[156663]: Connection closed by invalid user user 45.148.10.240 port 52530 [preauth] Dec 3 08:53:18 undercloud sshd[158705]: Invalid user solv from 45.148.10.240 port 56012 Dec 3 08:53:18 undercloud sshd[158705]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:53:18 undercloud sshd[158705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:53:20 undercloud sshd[158705]: Failed password for invalid user solv from 45.148.10.240 port 56012 ssh2 Dec 3 08:53:20 undercloud sshd[158705]: Connection closed by invalid user solv 45.148.10.240 port 56012 [preauth] Dec 3 08:55:36 undercloud sshd[160985]: Invalid user solv from 45.148.10.240 port 43488 Dec 3 08:55:37 undercloud sshd[160985]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:55:37 undercloud sshd[160985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:55:38 undercloud sshd[160985]: Failed password for invalid user solv from 45.148.10.240 port 43488 ssh2 Dec 3 08:55:39 undercloud sshd[160985]: Connection closed by invalid user solv 45.148.10.240 port 43488 [preauth] Dec 3 08:57:49 undercloud sshd[163056]: Invalid user solv from 45.148.10.240 port 38992 Dec 3 08:57:49 undercloud sshd[163056]: pam_unix(sshd:auth): check pass; user unknown Dec 3 08:57:49 undercloud sshd[163056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 08:57:51 undercloud sshd[163056]: Failed password for invalid user solv from 45.148.10.240 port 38992 ssh2 Dec 3 08:57:52 undercloud sshd[163056]: Connection closed by invalid user solv 45.148.10.240 port 38992 [preauth] Dec 3 09:00:05 undercloud sshd[165098]: Invalid user solv from 45.148.10.240 port 43616 Dec 3 09:00:06 undercloud sshd[165098]: pam_unix(sshd:auth): check pass; user unknown Dec 3 09:00:06 undercloud sshd[165098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 09:00:08 undercloud sshd[165098]: Failed password for invalid user solv from 45.148.10.240 port 43616 ssh2 Dec 3 09:00:10 undercloud sshd[165098]: Connection closed by invalid user solv 45.148.10.240 port 43616 [preauth] Dec 3 09:02:29 undercloud sshd[167521]: Invalid user solv from 45.148.10.240 port 52460 Dec 3 09:02:29 undercloud sshd[167521]: pam_unix(sshd:auth): check pass; user unknown Dec 3 09:02:29 undercloud sshd[167521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 09:02:31 undercloud sshd[167521]: Failed password for invalid user solv from 45.148.10.240 port 52460 ssh2 Dec 3 09:02:32 undercloud sshd[167521]: Connection closed by invalid user solv 45.148.10.240 port 52460 [preauth] Dec 3 09:02:35 undercloud sshd[167550]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.135.232.92 user=admin Dec 3 09:02:35 undercloud sshd[167550]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 09:02:37 undercloud sshd[167550]: Failed password for admin from 45.135.232.92 port 46846 ssh2 Dec 3 09:02:39 undercloud sshd[167554]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.135.232.92 user=admin Dec 3 09:02:39 undercloud sshd[167554]: pam_sss(sshd:auth): received for user admin: 7 (Authentication failure) Dec 3 09:02:41 undercloud sshd[167550]: error: PAM: Authentication failure for admin from 45.135.232.92 Dec 3 09:02:41 undercloud sshd[167550]: fatal: userauth_finish: send failure packet: Connection reset by peer [preauth] Dec 3 09:04:47 undercloud sshd[169585]: Invalid user validator from 45.148.10.240 port 59410 Dec 3 09:04:47 undercloud sshd[169585]: pam_unix(sshd:auth): check pass; user unknown Dec 3 09:04:47 undercloud sshd[169585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 09:04:49 undercloud sshd[169585]: Failed password for invalid user validator from 45.148.10.240 port 59410 ssh2 Dec 3 09:04:49 undercloud sshd[169585]: Connection closed by invalid user validator 45.148.10.240 port 59410 [preauth] Dec 3 09:07:10 undercloud sshd[171991]: Invalid user solana from 45.148.10.240 port 44336 Dec 3 09:07:10 undercloud sshd[171991]: pam_unix(sshd:auth): check pass; user unknown Dec 3 09:07:10 undercloud sshd[171991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 09:07:12 undercloud sshd[171991]: Failed password for invalid user solana from 45.148.10.240 port 44336 ssh2 Dec 3 09:07:13 undercloud sshd[171991]: Connection closed by invalid user solana 45.148.10.240 port 44336 [preauth] Dec 3 09:09:28 undercloud sshd[174570]: Invalid user solana from 45.148.10.240 port 46514 Dec 3 09:09:28 undercloud sshd[174570]: pam_unix(sshd:auth): check pass; user unknown Dec 3 09:09:28 undercloud sshd[174570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.240 Dec 3 09:09:30 undercloud sshd[174570]: Failed password for invalid user solana from 45.148.10.240 port 46514 ssh2 Dec 3 09:09:31 undercloud sshd[174570]: Connection closed by invalid user solana 45.148.10.240 port 46514 [preauth] Dec 3 09:09:32 undercloud unix_chkpwd[174725]: password check failed for user (root) Dec 3 09:09:32 undercloud sshd[174676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=root Dec 3 09:09:34 undercloud sshd[174676]: Failed password for root from 45.140.17.124 port 39904 ssh2 Dec 3 09:09:35 undercloud unix_chkpwd[174890]: password check failed for user (root) Dec 3 09:09:37 undercloud sshd[174676]: error: PAM: Authentication failure for root from 45.140.17.124 Dec 3 09:09:37 undercloud sshd[174676]: Connection reset by authenticating user root 45.140.17.124 port 39904 [preauth] Dec 3 09:09:39 undercloud unix_chkpwd[174939]: password check failed for user (root) Dec 3 09:09:39 undercloud sshd[174923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=root Dec 3 09:09:40 undercloud sshd[174923]: Failed password for root from 45.140.17.124 port 39920 ssh2 Dec 3 09:09:42 undercloud unix_chkpwd[175019]: password check failed for user (root) Dec 3 09:09:44 undercloud sshd[174923]: error: PAM: Authentication failure for root from 45.140.17.124 Dec 3 09:09:44 undercloud sshd[174923]: Connection reset by authenticating user root 45.140.17.124 port 39920 [preauth] Dec 3 09:09:46 undercloud unix_chkpwd[175074]: password check failed for user (root) Dec 3 09:09:46 undercloud sshd[175055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=root Dec 3 09:09:48 undercloud sshd[175055]: Failed password for root from 45.140.17.124 port 55902 ssh2 Dec 3 09:09:49 undercloud unix_chkpwd[175133]: password check failed for user (root) Dec 3 09:09:51 undercloud sshd[175055]: error: PAM: Authentication failure for root from 45.140.17.124 Dec 3 09:09:52 undercloud sshd[175055]: Connection reset by authenticating user root 45.140.17.124 port 55902 [preauth] Dec 3 09:10:02 undercloud sudo[175620]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/cp /etc/openstack/clouds.yaml /home/zuul/.config/openstack Dec 3 09:10:02 undercloud sudo[175620]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 09:10:02 undercloud sudo[175620]: pam_unix(sudo:session): session closed for user root Dec 3 09:10:02 undercloud sudo[175623]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chmod 0600 /home/zuul/.config/openstack/clouds.yaml Dec 3 09:10:02 undercloud sudo[175623]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 09:10:02 undercloud sudo[175623]: pam_unix(sudo:session): session closed for user root Dec 3 09:10:02 undercloud sudo[175626]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R 1000:1000 /home/zuul/.config Dec 3 09:10:02 undercloud sudo[175626]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 09:10:02 undercloud sudo[175626]: pam_unix(sudo:session): session closed for user root Dec 3 09:10:04 undercloud sshd[26708]: Received disconnect from 192.168.122.11 port 46598:11: disconnected by user Dec 3 09:10:04 undercloud sshd[26708]: Disconnected from user zuul 192.168.122.11 port 46598 Dec 3 09:10:04 undercloud sshd[26705]: pam_unix(sshd:session): session closed for user zuul Dec 3 09:10:14 undercloud sshd[175772]: Accepted publickey for zuul from 38.102.83.114 port 59896 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 09:10:14 undercloud sshd[175772]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Dec 3 09:10:14 undercloud sudo[175790]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kmrvpfsaqraclaqwagipbjqckqarddsb ; /usr/bin/python3 Dec 3 09:10:14 undercloud sudo[175790]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Dec 3 09:10:15 undercloud sudo[175790]: pam_unix(sudo:session): session closed for user root Dec 3 09:10:16 undercloud sshd[175772]: pam_unix(sshd:session): session closed for user zuul Dec 3 09:10:33 undercloud sshd[176100]: Accepted publickey for zuul from 38.102.83.114 port 39324 ssh2: RSA SHA256:gF+0hr5jpgH1Cu8SALneSAAngDQnv0K5eb1sd6Ac9dU Dec 3 09:10:33 undercloud sshd[176100]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0)